Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
superh.elf

Overview

General Information

Sample name:superh.elf
Analysis ID:1575402
MD5:3ad9b23713e6b7b9304acf7eb5063fed
SHA1:f64ae824cffe31d2caef5c0b514f430d546471c7
SHA256:36c63d23e1cfaa75b7f4c36ad9f55f77371da01f38e117fad337ddca8c228823
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Performs DNS TXT record lookups
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1575402
Start date and time:2024-12-15 13:24:45 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 0s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:superh.elf
Detection:MAL
Classification:mal60.spyw.evad.linELF@0/0@3/0
Command:/tmp/superh.elf
PID:5494
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Firmware update in progress
Standard Error:
  • system is lnxubuntu20
  • superh.elf (PID: 5494, Parent: 5419, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/superh.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: superh.elfVirustotal: Detection: 28%Perma Link
Source: superh.elfReversingLabs: Detection: 36%

Networking

barindex
Source: /tmp/superh.elf (PID: 5498)Opens: /sys/class/net/Jump to behavior
Source: /tmp/superh.elf (PID: 5498)Opens: /sys/class/net/lo/addressJump to behavior
Source: /tmp/superh.elf (PID: 5498)Opens: /sys/class/net/ens160/addressJump to behavior
Source: /tmp/superh.elf (PID: 5498)Opens: /sys/class/net/ens160/flagsJump to behavior
Source: /tmp/superh.elf (PID: 5498)Opens: /sys/class/net/ens160/carrierJump to behavior
Source: global trafficTCP traffic: 192.168.2.13:39172 -> 5.231.4.240:2022
Source: unknownTCP traffic detected without corresponding DNS query: 5.231.4.240
Source: unknownTCP traffic detected without corresponding DNS query: 5.231.4.240
Source: unknownTCP traffic detected without corresponding DNS query: 5.231.4.240
Source: unknownTCP traffic detected without corresponding DNS query: 5.231.4.240
Source: unknownTCP traffic detected without corresponding DNS query: 5.231.4.240
Source: unknownTCP traffic detected without corresponding DNS query: 5.231.4.240
Source: unknownUDP traffic detected without corresponding DNS query: 172.217.192.127
Source: unknownUDP traffic detected without corresponding DNS query: 65.21.1.106
Source: global trafficDNS traffic detected: DNS query: iranistrash.libre
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal60.spyw.evad.linELF@0/0@3/0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/superh.elf (PID: 5494)File: /tmp/superh.elfJump to behavior
Source: /tmp/superh.elf (PID: 5494)Queries kernel information via 'uname': Jump to behavior
Source: /tmp/superh.elf (PID: 5498)Queries kernel information via 'uname': Jump to behavior
Source: superh.elf, 5494.1.00007fff9341f000.00007fff93440000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
Source: superh.elf, 5494.1.0000559193374000.00005591933f8000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
Source: superh.elf, 5494.1.0000559193374000.00005591933f8000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
Source: superh.elf, 5494.1.00007fff9341f000.00007fff93440000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/superh.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/superh.elf

HIPS / PFW / Operating System Protection Evasion

barindex
Source: TrafficDNS traffic detected: queries for: iranistrash.libre
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575402 Sample: superh.elf Startdate: 15/12/2024 Architecture: LINUX Score: 60 18 iranistrash.libre 2->18 20 172.217.192.127, 3478, 53301 GOOGLEUS United States 2->20 22 2 other IPs or domains 2->22 24 Multi AV Scanner detection for submitted file 2->24 8 superh.elf 2->8         started        signatures3 26 Performs DNS TXT record lookups 18->26 process4 signatures5 28 Sample deletes itself 8->28 11 superh.elf 8->11         started        process6 signatures7 30 Opens /sys/class/net/* files useful for querying network interface information 11->30 14 superh.elf 11->14         started        16 superh.elf 11->16         started        process8
SourceDetectionScannerLabelLink
superh.elf29%VirustotalBrowse
superh.elf37%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    iranistrash.libre
    unknown
    unknownfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      5.231.4.240
      unknownGermany
      12586ASGHOSTNETDEfalse
      172.217.192.127
      unknownUnited States
      15169GOOGLEUSfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      5.231.4.240mipsel.elfGet hashmaliciousUnknownBrowse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        daisy.ubuntu.commips.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.25
        armv6l.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.24
        armv6l.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        i686.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        IGz.arm6.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        hidakibest.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.25
        hidakibest.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        hidakibest.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.25
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ASGHOSTNETDEarmv7l.elfGet hashmaliciousUnknownBrowse
        • 89.144.41.169
        mipsel.elfGet hashmaliciousUnknownBrowse
        • 5.231.4.240
        mipsel64.elfGet hashmaliciousUnknownBrowse
        • 5.230.251.14
        powerpc.elfGet hashmaliciousUnknownBrowse
        • 5.230.33.236
        jmggnxeedy.elfGet hashmaliciousUnknownBrowse
        • 94.249.207.54
        la.bot.mips.elfGet hashmaliciousUnknownBrowse
        • 94.249.188.214
        powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 195.200.192.218
        arm5.elfGet hashmaliciousUnknownBrowse
        • 5.83.147.14
        mpsl.elfGet hashmaliciousUnknownBrowse
        • 5.83.147.14
        arm7.elfGet hashmaliciousMiraiBrowse
        • 5.83.147.14
        No context
        No context
        No created / dropped files found
        File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
        Entropy (8bit):6.8073371890842305
        TrID:
        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
        File name:superh.elf
        File size:70'712 bytes
        MD5:3ad9b23713e6b7b9304acf7eb5063fed
        SHA1:f64ae824cffe31d2caef5c0b514f430d546471c7
        SHA256:36c63d23e1cfaa75b7f4c36ad9f55f77371da01f38e117fad337ddca8c228823
        SHA512:769e42bdedcfdf84e453de15c88c8ce5aaa895c666f57f000e7be4daa95503b21af3d86c9dabbc6817b50ad631d073cf09e548c18282d54009403b9e174d1769
        SSDEEP:1536:R9R8FxNWl2wt0KX5GmelWcSDfGHOWYzCR:R9R8FxNWHDozlpSDOdYz
        TLSH:4E638E32D4186F58D100CAB4B4F9CF7D5B83B815912B2EB65ADAC528590BECCF1863F8
        File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@...........................B...B.................Q.td............................././"O.n........#.*@........#.*@.....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

        ELF header

        Class:ELF32
        Data:2's complement, little endian
        Version:1 (current)
        Machine:<unknown>
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - System V
        ABI Version:0
        Entry Point Address:0x4001a0
        Flags:0x9
        ELF Header Size:52
        Program Header Offset:52
        Program Header Size:32
        Number of Program Headers:3
        Section Header Offset:70312
        Section Header Size:40
        Number of Section Headers:10
        Header String Table Index:9
        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
        NULL0x00x00x00x00x0000
        .initPROGBITS0x4000940x940x300x00x6AX004
        .textPROGBITS0x4000e00xe00x107a00x00x6AX0032
        .finiPROGBITS0x4108800x108800x240x00x6AX004
        .rodataPROGBITS0x4108a40x108a40x8280x00x2A004
        .ctorsPROGBITS0x4210d00x110d00x80x00x3WA004
        .dtorsPROGBITS0x4210d80x110d80x80x00x3WA004
        .dataPROGBITS0x4210e40x110e40x1840x00x3WA004
        .bssNOBITS0x4212680x112680x146c0x00x3WA004
        .shstrtabSTRTAB0x00x112680x3e0x00x0001
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x4000000x4000000x110cc0x110cc6.84070x5R E0x10000.init .text .fini .rodata
        LOAD0x110d00x4210d00x4210d00x1980x16041.29090x6RW 0x10000.ctors .dtors .data .bss
        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
        TimestampSource PortDest PortSource IPDest IP
        Dec 15, 2024 13:26:04.789534092 CET391722022192.168.2.135.231.4.240
        Dec 15, 2024 13:26:04.909806967 CET2022391725.231.4.240192.168.2.13
        Dec 15, 2024 13:26:04.909876108 CET391722022192.168.2.135.231.4.240
        Dec 15, 2024 13:26:04.910402060 CET391722022192.168.2.135.231.4.240
        Dec 15, 2024 13:26:05.098089933 CET2022391725.231.4.240192.168.2.13
        Dec 15, 2024 13:26:05.433718920 CET3480253192.168.2.138.8.8.8
        Dec 15, 2024 13:26:05.554605961 CET53348028.8.8.8192.168.2.13
        Dec 15, 2024 13:26:05.554667950 CET3480253192.168.2.138.8.8.8
        Dec 15, 2024 13:26:05.554709911 CET3480253192.168.2.138.8.8.8
        Dec 15, 2024 13:26:05.554729939 CET3480253192.168.2.138.8.8.8
        Dec 15, 2024 13:26:05.674669981 CET53348028.8.8.8192.168.2.13
        Dec 15, 2024 13:26:05.674802065 CET53348028.8.8.8192.168.2.13
        Dec 15, 2024 13:26:06.314711094 CET2022391725.231.4.240192.168.2.13
        Dec 15, 2024 13:26:06.314795971 CET391722022192.168.2.135.231.4.240
        Dec 15, 2024 13:26:06.639738083 CET53348028.8.8.8192.168.2.13
        Dec 15, 2024 13:26:06.640007973 CET3480253192.168.2.138.8.8.8
        Dec 15, 2024 13:26:06.875664949 CET53348028.8.8.8192.168.2.13
        Dec 15, 2024 13:26:06.875885010 CET3480253192.168.2.138.8.8.8
        Dec 15, 2024 13:26:08.639847040 CET53348028.8.8.8192.168.2.13
        Dec 15, 2024 13:26:08.639986038 CET3480253192.168.2.138.8.8.8
        Dec 15, 2024 13:26:08.759686947 CET53348028.8.8.8192.168.2.13
        Dec 15, 2024 13:27:16.366544962 CET391722022192.168.2.135.231.4.240
        Dec 15, 2024 13:27:16.486258030 CET2022391725.231.4.240192.168.2.13
        Dec 15, 2024 13:27:16.845446110 CET2022391725.231.4.240192.168.2.13
        Dec 15, 2024 13:27:16.845586061 CET391722022192.168.2.135.231.4.240
        TimestampSource PortDest PortSource IPDest IP
        Dec 15, 2024 13:26:03.254048109 CET533013478192.168.2.13172.217.192.127
        Dec 15, 2024 13:26:04.453347921 CET347853301172.217.192.127192.168.2.13
        Dec 15, 2024 13:26:04.522038937 CET5138353192.168.2.1365.21.1.106
        Dec 15, 2024 13:26:04.786359072 CET535138365.21.1.106192.168.2.13
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Dec 15, 2024 13:26:04.522038937 CET192.168.2.1365.21.1.1060x66a1Standard query (0)iranistrash.libre16IN (0x0001)false
        Dec 15, 2024 13:26:05.554709911 CET192.168.2.138.8.8.80x5772Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
        Dec 15, 2024 13:26:05.554729939 CET192.168.2.138.8.8.80x17Standard query (0)daisy.ubuntu.com28IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Dec 15, 2024 13:26:04.786359072 CET65.21.1.106192.168.2.130x66a1No error (0)iranistrash.libreTXT (Text strings)IN (0x0001)false
        Dec 15, 2024 13:26:06.639738083 CET8.8.8.8192.168.2.130x5772No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
        Dec 15, 2024 13:26:06.639738083 CET8.8.8.8192.168.2.130x5772No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

        System Behavior

        Start time (UTC):12:25:59
        Start date (UTC):15/12/2024
        Path:/tmp/superh.elf
        Arguments:/tmp/superh.elf
        File size:4139976 bytes
        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

        Start time (UTC):12:26:02
        Start date (UTC):15/12/2024
        Path:/tmp/superh.elf
        Arguments:-
        File size:4139976 bytes
        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

        Start time (UTC):12:26:04
        Start date (UTC):15/12/2024
        Path:/tmp/superh.elf
        Arguments:-
        File size:4139976 bytes
        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

        Start time (UTC):12:26:04
        Start date (UTC):15/12/2024
        Path:/tmp/superh.elf
        Arguments:-
        File size:4139976 bytes
        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9