Edit tour
Linux
Analysis Report
dlr.mpsl.elf
Overview
General Information
Sample name: | dlr.mpsl.elf |
Analysis ID: | 1546729 |
MD5: | bc7c970f3f8e1211a12c141741274031 |
SHA1: | 6f733a53c545badf3337422f95a974cfc56f5176 |
SHA256: | d3f39b50f80370ecaa0355e2b6aa7f5bcc306a88180504f675fbd683e59864b8 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Okiru
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Okiru
Found strings indicative of a multi-platform dropper
HTTP GET or POST without a user agent
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1546729 |
Start date and time: | 2024-11-01 14:57:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 40s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | dlr.mpsl.elf |
Detection: | MAL |
Classification: | mal64.troj.linELF@0/1@0/0 |
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: dlr.mpsl.elf
Command: | /tmp/dlr.mpsl.elf |
PID: | 6239 |
Exit Code: | 5 |
Exit Code Info: | |
Killed: | False |
Standard Output: | byte bro |
Standard Error: |
- system is lnxubuntu20
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | String: |