Linux Analysis Report
dlr.spc.elf

Overview

General Information

Sample name: dlr.spc.elf
Analysis ID: 1546730
MD5: 08c748ee2db6869537e13a34d8fbd2eb
SHA1: f6052fb46120ef11bec465118e4039add65ca2c9
SHA256: aa91fc88198bfc902bb42efd5f0abcd59aedc8e7215e6872a1d583ef70ee0e12
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: dlr.spc.elf ReversingLabs: Detection: 39%
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal48.linELF@0/0@2/0
Source: /tmp/dlr.spc.elf (PID: 5431) Queries kernel information via 'uname': Jump to behavior
Source: dlr.spc.elf, 5431.1.000055b4b76e5000.000055b4b7727000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sparc
Source: dlr.spc.elf, 5431.1.000055b4b76e5000.000055b4b7727000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/sparc
Source: dlr.spc.elf, 5431.1.00007ffdb67cb000.00007ffdb67ec000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sparc/tmp/dlr.spc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/dlr.spc.elf
Source: dlr.spc.elf, 5431.1.00007ffdb67cb000.00007ffdb67ec000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sparc
No contacted IP infos