Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
vmpcow.elf

Overview

General Information

Sample name:vmpcow.elf
Analysis ID:1545736
MD5:5df62a68cab91f2fdf4f80667af4d9c3
SHA1:82661c098f9f8b5f4233432a966186438b6411c8
SHA256:bad9bff0b3e11481a8874e368f3c0930937237b33bf9b8815a504b2efa858e82
Tags:elfuser-MDMCk10
Infos:

Detection

Masscan
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Masscan tool
Contains VNC / remote desktop functionality (version string found)
Sample contains only a LOAD segment without any section mappings
Sample contains strings that are potentially command strings
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1545736
Start date and time:2024-10-30 22:30:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:vmpcow.elf
Detection:MAL
Classification:mal68.troj.linELF@0/0@0/0
  • VT rate limit hit for: vmpcow.elf
Command:/tmp/vmpcow.elf
PID:5506
Exit Code:1
Exit Code Info:
Killed:False
Standard Output:
usage: masscan [options] [<IP|RANGE>... -pPORT[,PORT...]]

examples:
masscan -p80,8000-8100 10.0.0.0/8 --rate=10000
scan some web ports on 10.x.x.x at 10kpps

masscan --nmap
list those options that are compatible with nmap

masscan -p80 10.0.0.0/8 --banners -oB <filename>
save results of scan in binary format to <filename>

masscan --open --banners --readscan <filename> -oX <savefile>
read binary scan results in <filename> and save them as xml in <savefile>
Standard Error:
  • system is lnxubuntu20
  • vmpcow.elf (PID: 5506, Parent: 5430, MD5: 5df62a68cab91f2fdf4f80667af4d9c3) Arguments: /tmp/vmpcow.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
vmpcow.elfJoeSecurity_MasscanYara detected Masscan toolJoe Security
    vmpcow.elfLinux_Hacktool_Portscan_a40c7ef0unknownunknown
    • 0x990f8:$a: 54 50 44 00 52 65 73 70 6F 6E 73 65 20 77 61 73 20 4E 54 50 20
    vmpcow.elfLinux_Hacktool_Portscan_e191222dunknownunknown
    • 0x99001:$a: 46 4F 55 4E 44 00 56 41 4C 55 45 00 44 45 4C 45 54 45 44 00 54
    vmpcow.elfhacktool_multi_masscanmasscan is a performant port scanner, it produces results similar to nmap@mimeframe
    • 0x9a1a9:$a1: EHLO masscan
    • 0x91c7c:$a3: /etc/masscan/masscan.conf
    • 0x90568:$b1: nmap(%s): unsupported. This code will never do DNS lookups.
    • 0x907a8:$b2: nmap(%s): unsupported, we do timing WAY different than nmap
    • 0xa3511:$b4: [hint] VMware on Macintosh doesn't support masscan
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: vmpcow.elfReversingLabs: Detection: 13%

    Networking

    barindex
    Source: Yara matchFile source: vmpcow.elf, type: SAMPLE
    Source: vmpcow.elfString found in binary or memory: www.yahoo.com equals www.yahoo.com (Yahoo)
    Source: vmpcow.elfString found in binary or memory: www.yahoo.com0 equals www.yahoo.com (Yahoo)
    Source: vmpcow.elfString found in binary or memory: http://bit.ly/14GZzcT)
    Source: vmpcow.elfString found in binary or memory: http://clients1.google.com/ocsp0
    Source: vmpcow.elfString found in binary or memory: http://crl.geotrust.com/crls/gtglobal.crl0=
    Source: vmpcow.elfString found in binary or memory: http://crl.geotrust.com/crls/secureca.crl0N
    Source: vmpcow.elfString found in binary or memory: http://failsafe.fp.yahoo.com/404.html
    Source: vmpcow.elfString found in binary or memory: http://gtglobal-ocsp.geotrust.com0
    Source: vmpcow.elfString found in binary or memory: http://nmap.org/svn/docs/nmap.xsl
    Source: vmpcow.elfString found in binary or memory: http://nmap.org/svn/docs/nmap.xslCONF:
    Source: vmpcow.elfString found in binary or memory: http://pki.google.com/GIAG2.crl0
    Source: vmpcow.elfString found in binary or memory: http://pki.google.com/GIAG2.crt0
    Source: vmpcow.elfString found in binary or memory: https://github.com/robertdavidgraham/
    Source: vmpcow.elfString found in binary or memory: https://github.com/robertdavidgraham/masscan
    Source: vmpcow.elfString found in binary or memory: https://github.com/robertdavidgraham/masscan)
    Source: vmpcow.elfString found in binary or memory: https://github.com/robertdavidgraham/masscanCONF:
    Source: vmpcow.elfString found in binary or memory: https://www.geotrust.com/resources/repository0

    System Summary

    barindex
    Source: vmpcow.elf, type: SAMPLEMatched rule: Linux_Hacktool_Portscan_a40c7ef0 Author: unknown
    Source: vmpcow.elf, type: SAMPLEMatched rule: Linux_Hacktool_Portscan_e191222d Author: unknown
    Source: vmpcow.elf, type: SAMPLEMatched rule: masscan is a performant port scanner, it produces results similar to nmap Author: @mimeframe
    Source: LOAD without section mappingsProgram segment: 0x400000
    Source: Initial samplePotential command found: GET /version HTTP/1.1
    Source: Initial samplePotential command found: GET / HTTP/1.0
    Source: Initial samplePotential command found: GET / HTTP/1.1
    Source: Initial samplePotential command found: GET / FOO
    Source: Initial samplePotential command found: GET / XXXXXXXXXXXX
    Source: Initial samplePotential command found: GET / HTTP/1.1
    Source: Initial samplePotential command found: GET /foo.html
    Source: Initial samplePotential command found: GET /foo.html HTTP/1.0
    Source: Initial samplePotential command found: GET /longerthan HTTP/1.0
    Source: Initial samplePotential command found: GET /foo.html HTTP/1.0
    Source: Initial samplePotential command found: GET /foo.htmlGET /foo.html HTTP/1.0
    Source: Initial samplePotential command found: arp does not encapsulate another protocol
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: vmpcow.elf, type: SAMPLEMatched rule: Linux_Hacktool_Portscan_a40c7ef0 reference_sample = c389c42bac5d4261dbca50c848f22c701df4c9a2c5877dc01e2eaa81300bdc29, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Portscan, fingerprint = bf686c3c313936a144265cbf75850c8aee3af3ae36cb571050c7fceed385451d, id = a40c7ef0-627c-4965-b4d3-b05b79586170, last_modified = 2021-09-16
    Source: vmpcow.elf, type: SAMPLEMatched rule: Linux_Hacktool_Portscan_e191222d reference_sample = e2f4313538c3ef23adbfc50f37451c318bfd1ffd0e5aaa346cce4cc37417f812, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Portscan, fingerprint = 5580dd8b9180b8ff36c7d08a134b1b3782b41054d8b29b23fc5a79e7b0059fd1, id = e191222d-633a-4408-9a54-a70bb9e89cc0, last_modified = 2021-09-16
    Source: vmpcow.elf, type: SAMPLEMatched rule: hacktool_multi_masscan author = @mimeframe, description = masscan is a performant port scanner, it produces results similar to nmap, reference = https://github.com/robertdavidgraham/masscan
    Source: classification engineClassification label: mal68.troj.linELF@0/0@0/0
    Source: vmpcow.elfBinary or memory string: [hint] VMware on Macintosh doesn't support masscan
    Source: vmpcow.elfBinary or memory string: VMware
    Source: vmpcow.elfBinary or memory string: vmnet1
    Source: vmpcow.elfBinary or memory string: subject[VMware ESX Server Default Certificate]
    Source: vmpcow.elfBinary or memory string: icmperrcwr-ece-urg-ack-psh-rst-syn-fin-CompulabAaeonICPelecVMwareSeagateSynologyAsusD-LinkAppleAzurewaveOdroidRPi 22-11SupermicroCiscoUbiquiti[random]AmazonRPi 22-02HPRPi 20-07Cisco-LinksysRPi 19-12ZyxelTrolinkBelkinRPi 19-03RPi 12-03CeLinkNetgearParrotunknown status type: %u
    Source: vmpcow.elfBinary or memory string: issuer[VMware Inc]
    Source: vmpcow.elfBinary or memory string: ---------------nasend~~]issuer[iPECS]issuer[McAfeeissuer[webmin]issuer[Webmin subject[HP-IPG]issuer[LaCie SA]subject[OpenWrt]issuer[Puppet CAissuer[Kasperskysubject[Fortinet]issuer[ICC-FW CA]issuer[HIKVISION]subject[SHARP MX-issuer[GANDI SAS]subject[FortiGate]issuer[watchguard]issuer[VMware Inc]issuer[eBox Server]subject[WatchGuard]issuer[RapidSSL CA]issuer[AddTrust AB]issuer[Cisco SSCA2]subject[Cisco SSCA2]issuer[v] issuer[v]issuer[Register.com]issuer[Thawte, Inc.]issuer[thawte, Inc.]issuer[EQ-MT-RAPTOR]issuer[DigiCert Inc]issuer[TERENA SSL CA]issuer[WatchGuard CA]issuer[OpenVPN Web CAissuer[GeoTrust Inc.]issuer[TS Series NAS]subject[Polycom Inc.]issuer[Fortinet Ltd.]issuer[Synology Inc.]issuer[XX] issuer[XX]2Wire]Gateway Device]subject[DigiCert Inc]issuer[SamsungTechwin]issuer[TAIWAN-CA INC.]issuer[GeoTrust, Inc.]issuer[ValiCert, Inc.]issuer[Apache Friends]issuer[VeriSign, Inc.]issuer[Cybertrust Inc]subject[HiTRON SYSTEMS]issuer[SonicWALL, Inc.]issuer[Future Systems.]issuer[Polycom Root CA]issuer[AlphaSSL CA - G2]issuer[GlobalSign nv-sa]SonicWALL, Inc.]SSL-VPN]issuer[Comodo CA Limited]issuer[COMODO CA Limited]issuer[GoDaddy.com, Inc.]subject[Barracuda Networks]issuer[Equifax Secure Inc.]issuer[Gandi Standard SSL CA]issuer[The USERTRUST Network]subject[Polycom] subject[VSG]issuer[EuropeanSSL Server CA]issuer[SuSE Linux Web Server]issuer[CradlePoint Technology]SonicWALL]Secure Remote Access]subject[SomeOrganizationalUnit]issuer[Internet Widgits Pty Ltd]issuer[Network Solutions L.L.C.]issuer[The Go Daddy Group, Inc.]issuer[Nepenthes Development Team]issuer[WoSign Class 1 DV Server CA]issuer[Polycom Equipment Policy CA]issuer[Starfield Technologies, Inc.]issuer[Certum Certification Authority]subject[Fujitsu CELVIN(R) NAS Server]SonicWALL, Inc.]Secure Remote Access]issuer[Secure Digital Certificate Signing]issuer[Equifax Secure Certificate Authority]subject[VMware ESX Server Default Certificate]issuer[Cisco Systems] issuer[Cisco Manufacturing CA]truefalseoffline = %s
    Source: vmpcow.elfBinary or memory string: %s: ftell failed (file system error? seen with VMware HGFS bug)
    Source: vmpcow.elfBinary or memory string: if: datalinkvmnet1\Device\NPF_[-] if = not found (err=%d)

    Remote Access Functionality

    barindex
    Source: vmpcow.elfString found in binary or memory: RFB 000.000
    Source: vmpcow.elfString found in binary or memory: RFB 003.003
    Source: vmpcow.elfString found in binary or memory: RFB 003.005
    Source: vmpcow.elfString found in binary or memory: RFB 003.006
    Source: vmpcow.elfString found in binary or memory: RFB 003.007
    Source: vmpcow.elfString found in binary or memory: RFB 003.008
    Source: vmpcow.elfString found in binary or memory: RFB 003.889
    Source: vmpcow.elfString found in binary or memory: RFB 003.009
    Source: vmpcow.elfString found in binary or memory: RFB 004.000
    Source: vmpcow.elfString found in binary or memory: RFB 004.001
    Source: vmpcow.elfString found in binary or memory: RFB 004.002
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Command and Scripting Interpreter
    Path InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
    Security Software Discovery
    1
    Remote Desktop Protocol
    Data from Local System1
    Remote Access Software
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    vmpcow.elf13%ReversingLabsLinux.Hacktool.Prtscan
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://github.com/robertdavidgraham/masscan)vmpcow.elffalse
      unknown
      http://pki.google.com/GIAG2.crt0vmpcow.elffalse
        unknown
        https://github.com/robertdavidgraham/masscanvmpcow.elffalse
          unknown
          https://github.com/robertdavidgraham/masscanCONF:vmpcow.elffalse
            unknown
            http://failsafe.fp.yahoo.com/404.htmlvmpcow.elffalse
              unknown
              http://nmap.org/svn/docs/nmap.xslvmpcow.elffalse
                unknown
                http://nmap.org/svn/docs/nmap.xslCONF:vmpcow.elffalse
                  unknown
                  https://github.com/robertdavidgraham/vmpcow.elffalse
                    unknown
                    http://pki.google.com/GIAG2.crl0vmpcow.elffalse
                      unknown
                      http://bit.ly/14GZzcT)vmpcow.elffalse
                        unknown
                        No contacted IP infos
                        No context
                        No context
                        No context
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.543467690172182
                        TrID:
                        • ELF Executable and Linkable format (Linux) (4029/14) 49.77%
                        • ELF Executable and Linkable format (generic) (4004/1) 49.46%
                        • Lumena CEL bitmap (63/63) 0.78%
                        File name:vmpcow.elf
                        File size:869'560 bytes
                        MD5:5df62a68cab91f2fdf4f80667af4d9c3
                        SHA1:82661c098f9f8b5f4233432a966186438b6411c8
                        SHA256:bad9bff0b3e11481a8874e368f3c0930937237b33bf9b8815a504b2efa858e82
                        SHA512:9236e293139f1a2353309d7c177e41040559d17fdb8743b1e8b209101dee3ccbcdcf66f72ea2885d234bdf7a4c1f9a280fee3340451f8b0787d0e3efd6553267
                        SSDEEP:24576:NFZihv4QvjrgJm1syI0kkk0FkkLkkkPFKL:NHi51vjEJm4F
                        TLSH:39055C07B2E314FDC09BC835835FD222BD36B4991125797F2A88DA342E67F315B69B21
                        File Content Preview:.ELF..............>......!@.....@........@..........@.8...@.......................@.......@...............................................@.......@...............................................H.......H.....`.......`.......................P.......P.L....

                        ELF header

                        Class:ELF64
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:Advanced Micro Devices X86-64
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x4021fa
                        Flags:0x0
                        ELF Header Size:64
                        Program Header Offset:64
                        Program Header Size:56
                        Number of Program Headers:7
                        Section Header Offset:868536
                        Section Header Size:64
                        Number of Section Headers:16
                        Header String Table Index:15
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x4010000x10000x30x00x6AX001
                        .textPROGBITS0x4010100x10100x881f70x00x6AX0016
                        .finiPROGBITS0x4892070x892070x30x00x6AX001
                        .rodataPROGBITS0x48a0000x8a0000x330500x00x2A0032
                        .eh_framePROGBITS0x4bd0500xbd0500xdf100x00x2A008
                        .tbssNOBITS0x4cc9500xcb9500x1420x00x403WAT001
                        .init_arrayINIT_ARRAY0x4cc9500xcb9500x80x80x3WA008
                        .fini_arrayFINI_ARRAY0x4cc9580xcb9580x80x80x3WA008
                        .data.rel.roPROGBITS0x4cc9600xcb9600x36900x00x3WA0032
                        .gotPROGBITS0x4cfff00xceff00x80x00x3WA008
                        .got.pltPROGBITS0x4d00000xcf0000x180x80x3WA008
                        .dataPROGBITS0x4d00200xcf0200x4fc80x00x3WA0032
                        .bssNOBITS0x4d50000xd3fe80x1065d80x00x3WA0032
                        .commentPROGBITS0x00xd3fe80x500x10x30MS001
                        .shstrtabSTRTAB0x00xd40380x7c0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x4000000x4000000x1c80x1c82.07170x4R 0x1000
                        LOAD0x10000x4010000x4010000x8820a0x8820a6.30750x5R E0x1000.init .text .fini
                        LOAD0x8a0000x48a0000x48a0000x40f600x40f606.73250x4R 0x1000.rodata .eh_frame
                        LOAD0xcb9500x4cc9500x4cc9500x86980x10ec883.59620x6RW 0x1000.tbss .init_array .fini_array .data.rel.ro .got .got.plt .data .bss
                        TLS0xcb9500x4cc9500x4cc9500x00x1420.00000x4R 0x1.tbss
                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
                        GNU_RELRO0xcb9500x4cc9500x4cc9500x36b00x36b02.45310x4R 0x1.tbss .init_array .fini_array .data.rel.ro .got
                        No network behavior found

                        System Behavior

                        Start time (UTC):21:30:44
                        Start date (UTC):30/10/2024
                        Path:/tmp/vmpcow.elf
                        Arguments:/tmp/vmpcow.elf
                        File size:869560 bytes
                        MD5 hash:5df62a68cab91f2fdf4f80667af4d9c3