Linux Analysis Report
Z5VciPA3Nv.elf

Overview

General Information

Sample name: Z5VciPA3Nv.elf
renamed because original name is a hash value
Original sample name: 34dcfdc7d4c450f98de26b0c48bc532a2eb42b058bd9244a7ee0059c3bd84873.elf
Analysis ID: 1546916
MD5: 131a62d1b18a7ce543ccb47e46675c3a
SHA1: 908db9882977879b4b731f6ecb0fb32c285f8c22
SHA256: 34dcfdc7d4c450f98de26b0c48bc532a2eb42b058bd9244a7ee0059c3bd84873
Tags: elfransomwareSLNYAuser-JAMESWT_MHT
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Found Tor onion address
Contains symbols related to standard C library sleeps (sometimes used to evade sandboxing)
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: Z5VciPA3Nv.elf ReversingLabs: Detection: 44%

Networking

barindex
Source: Z5VciPA3Nv.elf, 6228.1.0000000008048000.000000000805f000.r-x.sdmp String found in binary or memory: http://xzbltrroh4ocknyi7kj2ucjuw63fhyy23dh6lplydl545d33kbygw2id.onion/
Source: Z5VciPA3Nv.elf String found in binary or memory: http://xzbltrroh4ocknyi7kj2ucjuw63fhyy23dh6lplydl545d33kbygw2id.onion/
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: Z5VciPA3Nv.elf String found in binary or memory: http://xzbltrroh4ocknyi7kj2ucjuw63fhyy23dh6lplydl545d33kbygw2id.onion/
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 33606
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 33606 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal52.evad.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 6260) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.5LhOIaz2ga /tmp/tmp.ILUnjFCeZL /tmp/tmp.lV2Das7e7n Jump to behavior
Source: /usr/bin/dash (PID: 6261) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.5LhOIaz2ga /tmp/tmp.ILUnjFCeZL /tmp/tmp.lV2Das7e7n Jump to behavior
Source: Z5VciPA3Nv.elf Submission file: segment LOAD with 7.4528 entropy (max. 8.0)
Source: ELF symbol in initial sample Symbol name: sleep
Source: /tmp/Z5VciPA3Nv.elf (PID: 6228) Queries kernel information via 'uname': Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs