Linux Analysis Report
sora.x86.elf

Overview

General Information

Sample name: sora.x86.elf
Analysis ID: 1565977
MD5: 74380e4c8328f3c9220eafb2b2bfae9f
SHA1: cd88ac7828ae46704c6224036b4138ed930823cf
SHA256: e7ad622d8165ec29523b46f57602a826f8aba32e94ca6cb45954d00e24d7d41c
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample deletes itself
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Yara signature match

Classification

AV Detection

barindex
Source: sora.x86.elf Avira: detected
Source: sora.x86.elf Virustotal: Detection: 36% Perma Link
Source: sora.x86.elf Joe Sandbox ML: detected
Source: unknown DNS traffic detected: query: replaycode: Name error (3)
Source: global traffic DNS traffic detected: DNS query:

System Summary

barindex
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: ELF static info symbol of initial sample .symtab present: no
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: sora.x86.elf, type: SAMPLE Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5591.1.0000000008048000.0000000008055000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engine Classification label: mal72.evad.linELF@0/0@5/0
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/110/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/231/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/231/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/111/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/112/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/233/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/233/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/113/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/114/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/235/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/115/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1333/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1333/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/116/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1695/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1695/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/117/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/118/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/119/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/119/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/911/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/911/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/914/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/914/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/10/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/10/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/917/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/917/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/11/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/11/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/12/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/12/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/13/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/13/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/14/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/14/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/15/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/15/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/16/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/16/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/17/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/17/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/18/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/18/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/19/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/19/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1591/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1591/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/120/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/120/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/121/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/121/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/122/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/122/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/243/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/243/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/2/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/2/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/123/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/123/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/3/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/3/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/124/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/124/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1588/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1588/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/125/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/125/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/4/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/4/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/246/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/246/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/126/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/126/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/5/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/5/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/127/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/127/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/6/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/6/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1585/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/1585/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/128/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/128/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/7/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/7/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/129/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/129/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/8/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/8/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/800/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/800/cmdline Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/9/maps Jump to behavior
Source: /tmp/sora.x86.elf (PID: 5595) File opened: /proc/9/cmdline Jump to behavior
Source: submitted sample Stderr: ioctl failed: No such device: exit code = 0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/sora.x86.elf (PID: 5591) File: /tmp/sora.x86.elf Jump to behavior
No contacted IP infos