Edit tour
Linux
Analysis Report
Zc9eO57fgF.elf
Overview
General Information
Sample name: | Zc9eO57fgF.elfrenamed because original name is a hash value |
Original sample name: | 20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7.elf |
Analysis ID: | 1548498 |
MD5: | 503c35c37d00d04ff2793c2b4bf5038f |
SHA1: | a03a9d06ca8441cb2ec7fe0c49cb56023130d884 |
SHA256: | 20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7 |
Tags: | elfRansomwareWEAXORuser-JAMESWT_MHT |
Infos: |
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Found Tor onion address
Reads system files that contain records of logged in users
Sample reads /proc/mounts (often used for finding a writable filesystem)
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Deletes log files
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "grep" command used to find patterns in files or piped streams
May check the online IP address of the machine
PID-file does not contain an ASCII number
Reads CPU information from /proc indicative of miner or evasive malware
Reads CPU information from /sys indicative of miner or evasive malware
Reads system information from the proc file system
Reads the 'hosts' file potentially containing internal network hosts
Sample has stripped symbol table
Sample listens on a socket
Sample tries to set the executable flag
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1548498 |
Start date and time: | 2024-11-04 15:17:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | Zc9eO57fgF.elfrenamed because original name is a hash value |
Original Sample Name: | 20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7.elf |
Detection: | MAL |
Classification: | mal52.troj.evad.linELF@0/60@1/0 |
- Connection to analysis system has been lost, crash info: Unknown
- VT rate limit hit for: Zc9eO57fgF.elf
- system is lnxubuntu20
- systemd New Fork (PID: 6255, Parent: 1)
- systemd New Fork (PID: 6321, Parent: 1)
- accounts-daemon New Fork (PID: 6331, Parent: 6321)
- language-validate New Fork (PID: 6333, Parent: 6331)
- language-options New Fork (PID: 6337, Parent: 6333)
- xfce4-session New Fork (PID: 6323, Parent: 1900)
- systemd New Fork (PID: 6324, Parent: 1860)
- gdm-session-worker New Fork (PID: 6328, Parent: 1809)
- gdm3 New Fork (PID: 6342, Parent: 1320)
- gdm-session-worker New Fork (PID: 6372, Parent: 6342)
- gdm-x-session New Fork (PID: 6374, Parent: 6372)
- gdm-x-session New Fork (PID: 6410, Parent: 6372)
- dbus-daemon New Fork (PID: 6412, Parent: 6410)
- dbus-daemon New Fork (PID: 6413, Parent: 6412)
- gdm3 New Fork (PID: 6344, Parent: 1320)
- gdm3 New Fork (PID: 6347, Parent: 1320)
- gdm3 New Fork (PID: 6365, Parent: 1320)
- gdm3 New Fork (PID: 6416, Parent: 1320)
- gdm3 New Fork (PID: 6417, Parent: 1320)
- cleanup
⊘No yara matches
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Reads CPU info from proc file: | Jump to behavior |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Networking |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Reads hosts file: | Jump to behavior |
Source: | Socket: | Jump to behavior | ||
Source: | Socket: | Jump to behavior |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |