Edit tour
Linux
Analysis Report
mipsel.elf
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Sample is packed with UPX
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1544066 |
Start date and time: | 2024-10-28 19:23:12 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 29s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | mipsel.elf |
Detection: | MAL |
Classification: | mal52.evad.linELF@0/0@0/0 |
- VT rate limit hit for: mipsel.elf
Command: | /tmp/mipsel.elf |
PID: | 5495 |
Exit Code: | 2 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: | fatal error: sigaction failed runtime stack: runtime.throw({0x382b3f, 0x10}) C:/Program Files/Go/src/runtime/panic.go:1077 +0x54 fp=0x7fffecdc sp=0x7fffecc8 pc=0x5a40c runtime.sysSigaction.func1() C:/Program Files/Go/src/runtime/os_linux.go:560 +0x4c fp=0x7fffece8 sp=0x7fffecdc pc=0x95d64 runtime.sysSigaction(0x41, 0x7fffed10, 0x0) C:/Program Files/Go/src/runtime/os_linux.go:559 +0x7c fp=0x7fffed00 sp=0x7fffece8 pc=0x569dc runtime.sigaction(...) C:/Program Files/Go/src/runtime/sigaction.go:15 runtime.setsig(0x41, 0x78f80) C:/Program Files/Go/src/runtime/os_linux.go:507 +0xbc fp=0x7fffed2c sp=0x7fffed00 pc=0x568a8 runtime.initsig(0x0) C:/Program Files/Go/src/runtime/signal_unix.go:148 +0x2c0 fp=0x7fffed68 sp=0x7fffed2c pc=0x785cc runtime.mstartm0() C:/Program Files/Go/src/runtime/proc.go:1624 +0x70 fp=0x7fffed70 sp=0x7fffed68 pc=0x62394 runtime.mstart1() C:/Program Files/Go/src/runtime/proc.go:1596 +0x94 fp=0x7fffed80 sp=0x7fffed70 pc=0x6228c runtime.mstart0() C:/Program Files/Go/src/runtime/proc.go:1557 +0x7c fp=0x7fffed94 sp=0x7fffed80 pc=0x621d8 runtime.mstart() C:/Program Files/Go/src/runtime/asm_mipsx.s:89 +0x14 fp=0x7fffed98 sp=0x7fffed94 pc=0x9d424 goroutine 1 [runnable]: runtime.main() C:/Program Files/Go/src/runtime/proc.go:144 fp=0x5b4227ec sp=0x5b4227ec pc=0x5e2f0 runtime.goexit() C:/Program Files/Go/src/runtime/asm_mipsx.s:641 +0x4 fp=0x5b4227ec sp=0x5b4227ec pc=0x9f858 |
- system is lnxubuntu20
- cleanup
⊘No yara matches
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Program segment: |
Source: | Binary or memory string: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Source: | Submission file: |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 11 Obfuscated Files or Information | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
16% | ReversingLabs | Linux.Trojan.Generic |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
⊘No contacted domains info
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
true |
| unknown | ||
false | unknown | |||
false | unknown |
⊘No contacted IP infos
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 7.884424247978719 |
TrID: |
|
File name: | mipsel.elf |
File size: | 1'824'684 bytes |
MD5: | b273d21df6a48d1d2d29b1f785f8c25e |
SHA1: | c044d8d910ec0a2b2870086f5737dc035dff12b0 |
SHA256: | 46c7f4cb6c058dc810da6b4d5bc970cc52effd1f6d58308d02c18ba51ef1c591 |
SHA512: | aa57ad63fda1657ea145458cc0bcbb63b1cb083658782f16c0ddf12bed6372f1735e824b0b870cf2a4328683e00169fddcdf4e2650ea0d969ba01bf6341173c1 |
SSDEEP: | 49152:ayYujGZpfmkpue3HULl8OdqaIGxkAwoS8:aaGTekMgulsa3xJa8 |
TLSH: | 4E8533EE4705A8E45BECDB2837A7ABA0981FD89C1480DC790A4F71673973F3996B104D |
File Content Preview: | .ELF........................4..........P4. ...(....................."..."................h...hZ..hZ.....................UPX!..........X...X.............w....ELF...............4......P. ...(........{.4.......\.t.......d.....M......0.'._.l?1.2t.!..F..?S.T.2 |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 2 |
Section Header Offset: | 0 |
Section Header Size: | 40 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x10000 | 0x10000 | 0x1bd722 | 0x1bd722 | 7.8845 | 0x5 | R E | 0x10000 | ||
LOAD | 0x68e8 | 0x5a68e8 | 0x5a68e8 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x10000 |
⊘No network behavior found
System Behavior
Start time (UTC): | 18:23:58 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/mipsel.elf |
Arguments: | /tmp/mipsel.elf |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |