Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ppc.elf

Overview

General Information

Sample name:ppc.elf
Analysis ID:1565895
MD5:a4e21db63d4968b182b205ddb4d768b0
SHA1:5371d406d837b390ca45108c1075528d26f29b69
SHA256:46336dffabf1d3fcd00f22ad8f98b57f05934ea539d60be63c16bf20ea407471
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1565895
Start date and time:2024-12-01 00:02:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ppc.elf
Detection:MAL
Classification:mal48.linELF@0/0@0/0
  • VT rate limit hit for: ppc.elf
Command:/tmp/ppc.elf
PID:6212
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Who loves the sun
Standard Error:
  • system is lnxubuntu20
  • ppc.elf (PID: 6212, Parent: 6136, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/ppc.elf
    • ppc.elf New Fork (PID: 6214, Parent: 6212)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ppc.elfReversingLabs: Detection: 52%
Source: global trafficTCP traffic: 192.168.2.23:37824 -> 45.147.200.148:6040
Source: global trafficTCP traffic: 192.168.2.23:60996 -> 85.239.34.134:2132
Source: global trafficTCP traffic: 192.168.2.23:33136 -> 194.87.198.191:10424
Source: /tmp/ppc.elf (PID: 6212)Socket: 127.0.0.1:57186Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 45.147.200.148
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 194.87.198.191
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/0@0/0
Source: /tmp/ppc.elf (PID: 6212)Queries kernel information via 'uname': Jump to behavior
Source: ppc.elf, 6212.1.000056171187b000.000056171192b000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
Source: ppc.elf, 6212.1.00007ffc10dea000.00007ffc10e0b000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ppc.elf
Source: ppc.elf, 6212.1.000056171187b000.000056171192b000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: ppc.elf, 6212.1.00007ffc10dea000.00007ffc10e0b000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ppc.elf53%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
85.239.34.134
unknownRussian Federation
134121RAINBOW-HKRainbownetworklimitedHKfalse
194.87.198.191
unknownRussian Federation
49352LOGOL-ASRUfalse
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
45.147.200.148
unknownRussian Federation
51659ASBAXETRUfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
85.239.34.134x86.elfGet hashmaliciousUnknownBrowse
    sh4.elfGet hashmaliciousUnknownBrowse
      mips.elfGet hashmaliciousUnknownBrowse
        arm6.elfGet hashmaliciousUnknownBrowse
          m68k.elfGet hashmaliciousUnknownBrowse
            arm7.elfGet hashmaliciousUnknownBrowse
              m68k.elfGet hashmaliciousUnknownBrowse
                x86.elfGet hashmaliciousUnknownBrowse
                  arm5.elfGet hashmaliciousUnknownBrowse
                    mpsl.elfGet hashmaliciousUnknownBrowse
                      194.87.198.191mips.elfGet hashmaliciousUnknownBrowse
                        arm7.elfGet hashmaliciousUnknownBrowse
                          harm4.elfGet hashmaliciousUnknownBrowse
                            hmips.elfGet hashmaliciousUnknownBrowse
                              109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                              • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                              45.147.200.148hmips.elfGet hashmaliciousUnknownBrowse
                                mips.elfGet hashmaliciousUnknownBrowse
                                  ppc.elfGet hashmaliciousUnknownBrowse
                                    hmips.elfGet hashmaliciousUnknownBrowse
                                      harm4.elfGet hashmaliciousUnknownBrowse
                                        harm5.elfGet hashmaliciousUnknownBrowse
                                          mips.elfGet hashmaliciousUnknownBrowse
                                            hmips.elfGet hashmaliciousUnknownBrowse
                                              ppc.elfGet hashmaliciousUnknownBrowse
                                                mips.elfGet hashmaliciousUnknownBrowse
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  RAINBOW-HKRainbownetworklimitedHKx86.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  arm6.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  m68k.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  arm7.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  m68k.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  x86.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  arm5.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  mpsl.elfGet hashmaliciousUnknownBrowse
                                                  • 85.239.34.134
                                                  LOGOL-ASRUmips.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.191
                                                  arm7.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.191
                                                  harm4.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.191
                                                  hmips.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.191
                                                  x86.elfGet hashmaliciousMiraiBrowse
                                                  • 194.87.198.29
                                                  x86.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.29
                                                  arm5.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.29
                                                  nshmpsl.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.29
                                                  nshmips.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.29
                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                  • 194.87.198.29
                                                  ASBAXETRUhmips.elfGet hashmaliciousUnknownBrowse
                                                  • 45.147.200.148
                                                  arm4.elfGet hashmaliciousUnknownBrowse
                                                  • 45.140.169.21
                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                  • 176.32.39.112
                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                  • 176.32.39.112
                                                  hmips.elfGet hashmaliciousUnknownBrowse
                                                  • 185.22.155.152
                                                  PAYMENT_ADVICE.exeGet hashmaliciousFormBookBrowse
                                                  • 176.32.38.183
                                                  specifications.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                  • 176.32.38.130
                                                  mpsl.elfGet hashmaliciousUnknownBrowse
                                                  • 45.140.169.21
                                                  harm4.elfGet hashmaliciousUnknownBrowse
                                                  • 45.147.200.148
                                                  harm5.elfGet hashmaliciousUnknownBrowse
                                                  • 45.140.168.235
                                                  INIT7CHx86.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  arm6.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  arm7.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  arm6.elfGet hashmaliciousMiraiBrowse
                                                  • 109.202.202.202
                                                  sshd.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  hmips.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  m68k.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  No context
                                                  No context
                                                  No created / dropped files found
                                                  File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                                                  Entropy (8bit):6.133080224804339
                                                  TrID:
                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                  File name:ppc.elf
                                                  File size:66'756 bytes
                                                  MD5:a4e21db63d4968b182b205ddb4d768b0
                                                  SHA1:5371d406d837b390ca45108c1075528d26f29b69
                                                  SHA256:46336dffabf1d3fcd00f22ad8f98b57f05934ea539d60be63c16bf20ea407471
                                                  SHA512:5934b654fddd5f2dc5baeee0d5c020c44bec5e7e1da31d7dcc47ee65dee0a81d4f3721e7d47ec4fcfc4d68c6065ff093c8ef56d57ae59cba04994144da03876f
                                                  SSDEEP:1536:W3zCsmccKRN3Ds5NoGOjYDcqF8rNYs/NhXDcEPxP0:WDFmQNzs5iGi/7hTxc
                                                  TLSH:09634B10B31A1D57F1A74DF43A3F27F143EEDC8430BAAA49291FBA4541B2A33518AED5
                                                  File Content Preview:.ELF...........................4...D.....4. ...(..........................................................-h...............T...T...T................dt.Q.............................!..|......$H...H..-...$8!. |...N.. .!..|.......?..........P..../...@..`= .

                                                  ELF header

                                                  Class:ELF32
                                                  Data:2's complement, big endian
                                                  Version:1 (current)
                                                  Machine:PowerPC
                                                  Version Number:0x1
                                                  Type:EXEC (Executable file)
                                                  OS/ABI:UNIX - System V
                                                  ABI Version:0
                                                  Entry Point Address:0x10000218
                                                  Flags:0x0
                                                  ELF Header Size:52
                                                  Program Header Offset:52
                                                  Program Header Size:32
                                                  Number of Program Headers:4
                                                  Section Header Offset:66116
                                                  Section Header Size:40
                                                  Number of Section Headers:16
                                                  Header String Table Index:15
                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                  NULL0x00x00x00x00x0000
                                                  .initPROGBITS0x100000b40xb40x240x00x6AX004
                                                  .textPROGBITS0x100000d80xd80xdf840x00x6AX004
                                                  .finiPROGBITS0x1000e05c0xe05c0x200x00x6AX004
                                                  .rodataPROGBITS0x1000e0800xe0800x1a000x00x2A008
                                                  .eh_framePROGBITS0x100100000x100000x540x00x3WA004
                                                  .tbssNOBITS0x100100540x100540x80x00x403WAT004
                                                  .ctorsPROGBITS0x100100540x100540x80x00x3WA004
                                                  .dtorsPROGBITS0x1001005c0x1005c0x80x00x3WA004
                                                  .jcrPROGBITS0x100100640x100640x40x00x3WA004
                                                  .dataPROGBITS0x100100680x100680x1200x00x3WA004
                                                  .gotPROGBITS0x100101880x101880x100x40x7WAX004
                                                  .sdataPROGBITS0x100101980x101980x440x00x3WA004
                                                  .sbssNOBITS0x100101dc0x101dc0x740x00x3WA004
                                                  .bssNOBITS0x100102500x101dc0x2b180x00x3WA004
                                                  .shstrtabSTRTAB0x00x101dc0x650x00x0001
                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                  LOAD0x00x100000000x100000000xfa800xfa806.25940x5R E0x1000.init .text .fini .rodata
                                                  LOAD0x100000x100100000x100100000x1dc0x2d682.42410x7RWE0x1000.eh_frame .tbss .ctors .dtors .jcr .data .got .sdata .sbss .bss
                                                  TLS0x100540x100100540x100100540x00x80.00000x4R 0x4.tbss
                                                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 1, 2024 00:02:44.839780092 CET60403782445.147.200.148192.168.2.23
                                                  Dec 1, 2024 00:02:44.840012074 CET378246040192.168.2.2345.147.200.148
                                                  Dec 1, 2024 00:02:45.390274048 CET609962132192.168.2.2385.239.34.134
                                                  Dec 1, 2024 00:02:45.510263920 CET21326099685.239.34.134192.168.2.23
                                                  Dec 1, 2024 00:02:45.510344982 CET609962132192.168.2.2385.239.34.134
                                                  Dec 1, 2024 00:02:45.511562109 CET609962132192.168.2.2385.239.34.134
                                                  Dec 1, 2024 00:02:45.631932020 CET21326099685.239.34.134192.168.2.23
                                                  Dec 1, 2024 00:02:45.632262945 CET609962132192.168.2.2385.239.34.134
                                                  Dec 1, 2024 00:02:45.752283096 CET21326099685.239.34.134192.168.2.23
                                                  Dec 1, 2024 00:02:46.763623953 CET43928443192.168.2.2391.189.91.42
                                                  Dec 1, 2024 00:02:50.060482025 CET1042433136194.87.198.191192.168.2.23
                                                  Dec 1, 2024 00:02:50.060631037 CET3313610424192.168.2.23194.87.198.191
                                                  Dec 1, 2024 00:02:52.138958931 CET42836443192.168.2.2391.189.91.43
                                                  Dec 1, 2024 00:02:53.930661917 CET4251680192.168.2.23109.202.202.202
                                                  Dec 1, 2024 00:02:55.520528078 CET609962132192.168.2.2385.239.34.134
                                                  Dec 1, 2024 00:02:55.640598059 CET21326099685.239.34.134192.168.2.23
                                                  Dec 1, 2024 00:02:55.958827972 CET21326099685.239.34.134192.168.2.23
                                                  Dec 1, 2024 00:02:55.958956003 CET609962132192.168.2.2385.239.34.134
                                                  Dec 1, 2024 00:03:06.984869003 CET43928443192.168.2.2391.189.91.42
                                                  Dec 1, 2024 00:03:19.271133900 CET42836443192.168.2.2391.189.91.43
                                                  Dec 1, 2024 00:03:23.366640091 CET4251680192.168.2.23109.202.202.202
                                                  Dec 1, 2024 00:03:47.939047098 CET43928443192.168.2.2391.189.91.42
                                                  Dec 1, 2024 00:03:56.011280060 CET609962132192.168.2.2385.239.34.134
                                                  Dec 1, 2024 00:03:56.134289026 CET21326099685.239.34.134192.168.2.23
                                                  Dec 1, 2024 00:03:56.452400923 CET21326099685.239.34.134192.168.2.23
                                                  Dec 1, 2024 00:03:56.452672005 CET609962132192.168.2.2385.239.34.134

                                                  System Behavior

                                                  Start time (UTC):23:02:44
                                                  Start date (UTC):30/11/2024
                                                  Path:/tmp/ppc.elf
                                                  Arguments:/tmp/ppc.elf
                                                  File size:5388968 bytes
                                                  MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                  Start time (UTC):23:02:44
                                                  Start date (UTC):30/11/2024
                                                  Path:/tmp/ppc.elf
                                                  Arguments:-
                                                  File size:5388968 bytes
                                                  MD5 hash:ae65271c943d3451b7f026d1fadccea6