Linux Analysis Report
zone.armv5.elf

Overview

General Information

Sample name: zone.armv5.elf
Analysis ID: 1545580
MD5: 73032b0249fe1dfc3c54fcc4c3c85c0f
SHA1: eb7e1b29e7dd483e9587937e63456f2612e63742
SHA256: 7bcced6ebff1e1dba919581e6d253a914347c5d65dcf72587b162e193598189e
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 24
Range: 0 - 100
Whitelisted: false

Signatures

Sample is packed with UPX
ELF contains segments with high entropy indicating compressed/encrypted content
Executes commands using a shell command-line interpreter
Executes the "grep" command used to find patterns in files or piped streams
Reads CPU information from /sys indicative of miner or evasive malware
Reads system information from the proc file system
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Source: /tmp/zone.armv5.elf (PID: 5537) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/uptime (PID: 5555) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /tmp/zone.armv5.elf (PID: 5537) Reads hosts file: /etc/hosts Jump to behavior
Source: /tmp/zone.armv5.elf (PID: 5537) Socket: [::]:14820 Jump to behavior
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: column.mrbasic.com
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: zone.armv5.elf String found in binary or memory: http://upx.sf.net
Source: LOAD without section mappings Program segment: 0x10000
Source: classification engine Classification label: sus24.evad.linELF@0/0@6/0

Data Obfuscation

barindex
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Id: UPX 4.24 Copyright (C) 1996-2024 the UPX Team. All Rights Reserved. $
Source: /tmp/zone.armv5.elf (PID: 5555) Shell command executed: /bin/bash -c uptime Jump to behavior
Source: /usr/bin/bash (PID: 5567) Grep executable: /usr/bin/grep -> grep ens160 Jump to behavior
Source: /usr/bin/bash (PID: 5572) Grep executable: /usr/bin/grep -> grep ens160 Jump to behavior
Source: /usr/bin/bash (PID: 5629) Grep executable: /usr/bin/grep -> grep ens160 Jump to behavior
Source: /usr/bin/bash (PID: 5634) Grep executable: /usr/bin/grep -> grep ens160 Jump to behavior
Source: /usr/bin/bash (PID: 5667) Grep executable: /usr/bin/grep -> grep ens160 Jump to behavior
Source: /usr/bin/bash (PID: 5672) Grep executable: /usr/bin/grep -> grep ens160 Jump to behavior
Source: /tmp/zone.armv5.elf (PID: 5530) Reads from proc file: /proc/stat Jump to behavior
Source: /tmp/zone.armv5.elf (PID: 5537) Reads from proc file: /proc/stat Jump to behavior
Source: /tmp/zone.armv5.elf (PID: 5537) Reads from proc file: /proc/sys/net/core/somaxconn Jump to behavior
Source: /usr/bin/bash (PID: 5568) Awk executable: /usr/bin/awk -> awk "{print $2}" Jump to behavior
Source: /usr/bin/bash (PID: 5573) Awk executable: /usr/bin/awk -> awk "{print $10}" Jump to behavior
Source: /usr/bin/bash (PID: 5630) Awk executable: /usr/bin/awk -> awk "{print $2}" Jump to behavior
Source: /usr/bin/bash (PID: 5635) Awk executable: /usr/bin/awk -> awk "{print $10}" Jump to behavior
Source: /usr/bin/bash (PID: 5668) Awk executable: /usr/bin/awk -> awk "{print $2}" Jump to behavior
Source: /usr/bin/bash (PID: 5673) Awk executable: /usr/bin/awk -> awk "{print $10}" Jump to behavior
Source: submitted sample Stderr: 2024/10/30 11:38:27 [*] get job: exit code = 0
Source: zone.armv5.elf Submission file: segment LOAD with 7.8821 entropy (max. 8.0)
Source: zone.armv5.elf Submission file: segment LOAD with 7.9999 entropy (max. 8.0)
Source: /tmp/zone.armv5.elf (PID: 5537) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/uptime (PID: 5555) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /tmp/zone.armv5.elf (PID: 5530) Queries kernel information via 'uname': Jump to behavior
Source: /tmp/zone.armv5.elf (PID: 5537) Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 5555) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/bash (PID: 5561) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/bash (PID: 5569) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/bash (PID: 5626) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/bash (PID: 5631) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/bash (PID: 5664) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/bash (PID: 5669) Queries kernel information via 'uname': Jump to behavior
Source: zone.armv5.elf, 5537.1.000055bd8ec2b000.000055bd8f366000.rw-.sdmp Binary or memory string: U2!/etc/qemu-binfmt/arm
Source: zone.armv5.elf Binary or memory string: hGFS^t
Source: zone.armv5.elf, 5537.1.00007ffd0575e000.00007ffd0577f000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/zone.armv5.elf-b =/tmp/zone.armv5.elfSHELL=/bin/bashSUDO_GID=1000MAIL=/var/mail/rootHOME=/rootSUDO_COMMAND=/bin/bashLANG=en_US.UTF-8USER=rootLOGNAME=rootCOLORTERM=truecolorTERM=xterm-256colorSUDO_UID=1000XAUTHORITY=/run/user/1000/gdm/XauthorityDISPLAY=:1.0PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binSUDO_USER=saturnino/tmp/zone.armv5.elf
Source: zone.armv5.elf, 5537.1.00007f7458000000.00007f74580b9000.rw-.sdmp Binary or memory string: .0"?><!DOCTYPE target SYSTEM "gdb-target.dtd"><feature name="org.qemu.gdb.arm.sys.regs"><reg name="AMAIR0_S" bitsize="32" group="cp_regs"/><reg name="AFSR0_EL1" bitsize="32" group="cp_regs"/><reg name="AMAIR1_S" bitsize="32" group="cp_regs"/><reg name="VBAR_S" bitsize="32" group="cp_regs"/><reg name="AFSR1_EL1" bitsize="32" group="cp_regs"/><reg name="DBGDIDR" bitsize="32" group="cp_regs"/><reg name="VPIDR_S" bitsize="32" group="cp_regs"/><reg name="DBGDSAR" bitsize="32" group="cp_regs"/>
Source: zone.armv5.elf, 5530.1.0000564f64576000.0000564f64c4a000.rw-.sdmp Binary or memory string: XdOV!/etc/qemu-binfmt/arm
Source: zone.armv5.elf, 5537.1.000055bd8ec2b000.000055bd8f366000.rw-.sdmp Binary or memory string: Urg.qemu.gdb.arm.sys.regs">
Source: zone.armv5.elf, 5537.1.000055bd8ec2b000.000055bd8f366000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: zone.armv5.elf, 5537.1.00007ffd0575e000.00007ffd0577f000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: zone.armv5.elf, 5530.1.00007fff141f4000.00007fff14215000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/zone.armv5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/zone.armv5.elf
Source: zone.armv5.elf, 5537.1.00007f7450000000.00007f74502a1000.rw-.sdmp, zone.armv5.elf, 5537.1.00007f7458000000.00007f74580b9000.rw-.sdmp, zone.armv5.elf, 5537.1.000055bd8ec2b000.000055bd8f366000.rw-.sdmp Binary or memory string: rg.qemu.gdb.arm.sys.regs">
Source: zone.armv5.elf, 5530.1.0000564f64576000.0000564f64c4a000.rw-.sdmp Binary or memory string: `WdOVrg.qemu.gdb.arm.sys.regs">
Source: zone.armv5.elf, 5537.1.00007f7450000000.00007f74502a1000.rw-.sdmp Binary or memory string: .qemu.gdb.arm.sys.regs"><reg name="AMAIR0_S" bitsize="32" group="cp_regs
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs