Linux Analysis Report
5.elf

Overview

General Information

Sample name: 5.elf
Analysis ID: 1544698
MD5: 5b5a489cf32871ee211beb85abf8d13f
SHA1: ef468f77d7a7876ea70b5cc929fc88a1eb76bfa5
SHA256: 679b4b41e9f0111bd983cbf5ce5cae53bed91ec32be768ef5792c09817e4d2d0
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

AV Detection

barindex
Source: 5.elf ReversingLabs: Detection: 44%
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: 5.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5426.1.00007f8008027000.00007f8008028000.rw-.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5426.1.00007f8008017000.00007f8008020000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 5.elf PID: 5426, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: ELF static info symbol of initial sample .symtab present: no
Source: 5.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5426.1.00007f8008027000.00007f8008028000.rw-.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5426.1.00007f8008017000.00007f8008020000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 5.elf PID: 5426, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engine Classification label: mal56.linELF@0/0@2/0
Source: /tmp/5.elf (PID: 5426) Queries kernel information via 'uname': Jump to behavior
Source: 5.elf, 5426.1.00007ffc5eb1b000.00007ffc5eb3c000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/5.elf
Source: 5.elf, 5426.1.00007ffc5eb1b000.00007ffc5eb3c000.rw-.sdmp Binary or memory string: qemu: %s: %s
Source: 5.elf, 5426.1.00005629b3e95000.00005629b3fc3000.rw-.sdmp Binary or memory string: )V!/etc/qemu-binfmt/arm
Source: 5.elf, 5426.1.00007ffc5eb1b000.00007ffc5eb3c000.rw-.sdmp Binary or memory string: leqemu: %s: %s
Source: 5.elf, 5426.1.00005629b3e95000.00005629b3fc3000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: 5.elf, 5426.1.00007ffc5eb1b000.00007ffc5eb3c000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: 5.elf, 5426.1.00005629b3e95000.00005629b3fc3000.rw-.sdmp Binary or memory string: rg.qemu.gdb.arm.sys.regs">
Source: 5.elf, 5426.1.00005629b3e95000.00005629b3fc3000.rw-.sdmp Binary or memory string: )Vrg.qemu.gdb.arm.sys.regs">
No contacted IP infos