Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
dbus.elf

Overview

General Information

Sample name:dbus.elf
Analysis ID:1579014
MD5:89282100982e5f4dc24ce6dff1690346
SHA1:610a2ce20b7a81e059c9a79f6da19dd3fbd34fa0
SHA256:ff0e1d1cd4f5cde24a3cb9ad571e92f8fa795aa9b42c829aeaeae2a6b8b020ae
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Found Tor onion address
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "ps" command used to list the status of processes
Reads CPU information from /sys indicative of miner or evasive malware
Reads system information from the proc file system
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1579014
Start date and time:2024-12-20 17:40:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:dbus.elf
Detection:MAL
Classification:mal56.troj.evad.linELF@0/0@0/0
  • VT rate limit hit for: dbus.elf
Command:/tmp/dbus.elf
PID:6239
Exit Code:
Exit Code Info:
Killed:True
Standard Output:

Standard Error:2024/12/20 10:40:59 Processo udiskssd no encontrado. Tentando reexecutar...
2024/12/20 10:40:59 Erro ao executar minerador diretamente: exec: "udiskssd": executable file not found in $PATH
2024/12/20 10:41:00 Erro ao buscar URL atualizado ou link invlido
2024/12/20 10:41:01 Erro ao contar instncias do processo: exit status 1
2024/12/20 10:41:14 Processo udiskssd no encontrado. Tentando reexecutar...
2024/12/20 10:41:14 Erro ao executar minerador diretamente: exec: "udiskssd": executable file not found in $PATH
2024/12/20 10:41:15 Erro ao buscar URL atualizado ou link invlido
2024/12/20 10:41:17 Erro ao contar instncias do processo: exit status 1
2024/12/20 10:41:29 Processo udiskssd no encontrado. Tentando reexecutar...
2024/12/20 10:41:29 Erro ao executar minerador diretamente: exec: "udiskssd": executable file not found in $PATH
2024/12/20 10:41:30 Erro ao buscar URL atualizado ou link invlido
2024/12/20 10:41:31 Erro ao contar instncias do processo: exit status 1
  • system is lnxubuntu20
  • dbus.elf (PID: 6239, Parent: 6161, MD5: 89282100982e5f4dc24ce6dff1690346) Arguments: /tmp/dbus.elf
    • dbus.elf New Fork (PID: 6243, Parent: 6239)
    • ps (PID: 6243, Parent: 6239, MD5: ab48054475a6f70f8e7fa847331f3327) Arguments: ps axo pid,comm,pcpu
    • dbus.elf New Fork (PID: 6244, Parent: 6239)
    • pgrep (PID: 6244, Parent: 6239, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep -x udiskssd
    • dbus.elf New Fork (PID: 6247, Parent: 6239)
    • pgrep (PID: 6247, Parent: 6239, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep -c udiskssd
    • dbus.elf New Fork (PID: 6253, Parent: 6239)
    • ps (PID: 6253, Parent: 6239, MD5: ab48054475a6f70f8e7fa847331f3327) Arguments: ps axo pid,comm,pcpu
    • dbus.elf New Fork (PID: 6254, Parent: 6239)
    • pgrep (PID: 6254, Parent: 6239, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep -x udiskssd
    • dbus.elf New Fork (PID: 6277, Parent: 6239)
    • pgrep (PID: 6277, Parent: 6239, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep -c udiskssd
    • dbus.elf New Fork (PID: 6282, Parent: 6239)
    • ps (PID: 6282, Parent: 6239, MD5: ab48054475a6f70f8e7fa847331f3327) Arguments: ps axo pid,comm,pcpu
    • dbus.elf New Fork (PID: 6285, Parent: 6239)
    • pgrep (PID: 6285, Parent: 6239, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep -x udiskssd
    • dbus.elf New Fork (PID: 6286, Parent: 6239)
    • pgrep (PID: 6286, Parent: 6239, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep -c udiskssd
    • dbus.elf New Fork (PID: 6292, Parent: 6239)
    • ps (PID: 6292, Parent: 6239, MD5: ab48054475a6f70f8e7fa847331f3327) Arguments: ps axo pid,comm,pcpu
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: dbus.elfReversingLabs: Detection: 31%
Source: /bin/pgrep (PID: 6244)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6247)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6254)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6277)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6285)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6286)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior

Networking

barindex
Source: dbus.elfString found in binary or memory: m=nil base , val X25519%w%.0wuint16uint32uint64structchan<-<-chan ValueAcceptServernetdnsdomaingophertelnetlisten.onionndots:ip+netsocketCommonhangupkilled/proc/errno splicerdtscppopcntcmd/goheaderAnswerLengthSTREETavx512rdrandrdseedUpgradeTrailerHEADERSReferer flags= len=%d (conn) %v=%v,expiresrefererrefreshtrailerGODEBUG:method:schemeupgrade:statushttp://chunkedCreatedIM UsedCONNECT (trap 19531259765625TuesdayJanuaryOctoberfloat32float64forcegcallocmWcpuprofallocmRunknowngctraceIO waitrunningsyscallwaitingUNKNOWN:events, goid= s=nil
Source: unknownNetwork traffic detected: HTTP traffic on port 58340 -> 3693
Source: unknownNetwork traffic detected: HTTP traffic on port 58342 -> 3693
Source: unknownNetwork traffic detected: HTTP traffic on port 58344 -> 3693
Source: global trafficTCP traffic: 192.168.2.23:58340 -> 107.172.88.151:3693
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 107.172.88.151
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: global trafficHTTP traffic detected: GET /get-url HTTP/1.1Host: 107.172.88.151:3693User-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: global trafficHTTP traffic detected: GET /get-url HTTP/1.1Host: 107.172.88.151:3693User-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: global trafficHTTP traffic detected: GET /get-url HTTP/1.1Host: 107.172.88.151:3693User-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpString found in binary or memory: http://107.172.88.151:3693
Source: dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpString found in binary or memory: http://107.172.88.151:3693/get-url
Source: dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpString found in binary or memory: http://107.172.88.151:3693/get-urlexec:
Source: dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpString found in binary or memory: http://107.172.88.151:3693/get-urlhttp://107.172.88.151:3693/get-url2024/12/20
Source: dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpString found in binary or memory: http://107.172.88.151:3693/usr/local/sbin/udiskssd/usr/lib/secure/udiskssd/var/tmp/config_daemon/udi
Source: dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpString found in binary or memory: http://107.172.88.151:36932024/12/20
Source: dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpString found in binary or memory: http://107.172.88.151:3693GET
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.troj.evad.linELF@0/0@0/0
Source: ELF file sectionSubmission: dbus.elf
Source: /bin/pgrep (PID: 6285)File opened: /proc/1582/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1582/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/3088/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/3088/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/230/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/230/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/110/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/110/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/231/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/231/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/111/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/111/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/232/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/232/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1579/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1579/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/112/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/112/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/233/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/233/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1699/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1699/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/113/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/113/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/234/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/234/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1335/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1335/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1698/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1698/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/114/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/114/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/235/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/235/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1334/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1334/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1576/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1576/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/2302/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/2302/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/115/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/115/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/236/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/236/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/116/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/116/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/237/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/237/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/117/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/117/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/118/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/118/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/910/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/910/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/119/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/119/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/912/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/912/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/10/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/10/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/2307/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/2307/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/11/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/11/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/918/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/918/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/12/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/12/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/13/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/13/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/14/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/14/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/15/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/15/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/16/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/16/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/17/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/17/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/18/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/18/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1594/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1594/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/120/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/120/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/121/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/121/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1349/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1349/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/1/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/122/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/122/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/243/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/243/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/123/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/123/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/2/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/2/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/124/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/124/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/3/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/3/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/4/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/4/cmdlineJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/125/statusJump to behavior
Source: /bin/pgrep (PID: 6285)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/dbus.elf (PID: 6243)Ps executable: /bin/ps -> ps axo pid,comm,pcpuJump to behavior
Source: /tmp/dbus.elf (PID: 6253)Ps executable: /bin/ps -> ps axo pid,comm,pcpuJump to behavior
Source: /tmp/dbus.elf (PID: 6282)Ps executable: /bin/ps -> ps axo pid,comm,pcpuJump to behavior
Source: /tmp/dbus.elf (PID: 6292)Ps executable: /bin/ps -> ps axo pid,comm,pcpuJump to behavior
Source: /bin/ps (PID: 6243)Reads from proc file: /proc/meminfoJump to behavior
Source: /bin/ps (PID: 6253)Reads from proc file: /proc/meminfoJump to behavior
Source: /bin/ps (PID: 6282)Reads from proc file: /proc/meminfoJump to behavior
Source: /bin/ps (PID: 6292)Reads from proc file: /proc/meminfoJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 58340 -> 3693
Source: unknownNetwork traffic detected: HTTP traffic on port 58342 -> 3693
Source: unknownNetwork traffic detected: HTTP traffic on port 58344 -> 3693
Source: /bin/pgrep (PID: 6244)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6247)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6254)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6277)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6285)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/pgrep (PID: 6286)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpBinary or memory string: 721 vmtoolsd 0.2
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
Proxy
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture1
Ingress Tool Transfer
Data Transfer Size LimitsService Stop
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1579014 Sample: dbus.elf Startdate: 20/12/2024 Architecture: LINUX Score: 56 17 109.202.202.202, 80 INIT7CH Switzerland 2->17 19 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->19 21 2 other IPs or domains 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Found Tor onion address 2->25 27 Uses known network protocols on non-standard ports 2->27 7 dbus.elf 2->7         started        signatures3 process4 process5 9 dbus.elf ps 7->9         started        11 dbus.elf pgrep 7->11         started        13 dbus.elf pgrep 7->13         started        15 7 other processes 7->15

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
dbus.elf32%ReversingLabsWin32.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://107.172.88.151:3693/get-urlfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://107.172.88.151:3693dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpfalse
      unknown
      http://107.172.88.151:3693/get-urlhttp://107.172.88.151:3693/get-url2024/12/20dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpfalse
        unknown
        http://107.172.88.151:3693/get-urlexec:dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpfalse
          unknown
          http://107.172.88.151:3693/usr/local/sbin/udiskssd/usr/lib/secure/udiskssd/var/tmp/config_daemon/udidbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpfalse
            unknown
            http://107.172.88.151:3693GETdbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpfalse
              unknown
              http://107.172.88.151:36932024/12/20dbus.elf, 6239.1.000000c000000000.000000c000400000.rw-.sdmpfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                107.172.88.151
                unknownUnited States
                36352AS-COLOCROSSINGUSfalse
                109.202.202.202
                unknownSwitzerland
                13030INIT7CHfalse
                91.189.91.43
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                91.189.91.42
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                107.172.88.151AI7f43Z7AC.exeGet hashmaliciousUnknownBrowse
                • 107.172.88.151:3693/get-url-win
                109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                91.189.91.43fenty.arm4.elfGet hashmaliciousMiraiBrowse
                  CONSTANT_STRATEGY.elfGet hashmaliciousSliverBrowse
                    10000.elfGet hashmaliciousUnknownBrowse
                      la.bot.arc.elfGet hashmaliciousMiraiBrowse
                        gnjqwpc.elfGet hashmaliciousMiraiBrowse
                          copy_netaddr.elfGet hashmaliciousXmrigBrowse
                            wiewa64.elfGet hashmaliciousMiraiBrowse
                              njvwa4.elfGet hashmaliciousMiraiBrowse
                                wrjkngh4.elfGet hashmaliciousMiraiBrowse
                                  woega6.elfGet hashmaliciousMiraiBrowse
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CANONICAL-ASGBfenty.arm4.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    CONSTANT_STRATEGY.elfGet hashmaliciousSliverBrowse
                                    • 91.189.91.42
                                    10000.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    gnjqwpc.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    copy_netaddr.elfGet hashmaliciousXmrigBrowse
                                    • 91.189.91.42
                                    wiewa64.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    wkb86.elfGet hashmaliciousMiraiBrowse
                                    • 185.125.190.26
                                    njvwa4.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    wrjkngh4.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    AS-COLOCROSSINGUScB1ItKbbhY.msiGet hashmaliciousUnknownBrowse
                                    • 23.94.207.151
                                    tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
                                    • 23.94.207.151
                                    e5mIhMkcj5.exeGet hashmaliciousUnknownBrowse
                                    • 23.94.207.151
                                    PVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
                                    • 23.94.207.151
                                    RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
                                    • 23.94.207.151
                                    tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
                                    • 23.94.207.151
                                    e5mIhMkcj5.exeGet hashmaliciousUnknownBrowse
                                    • 23.94.207.151
                                    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 107.174.209.17
                                    uctgkfb7.exeGet hashmaliciousXWormBrowse
                                    • 192.210.175.202
                                    file.exeGet hashmaliciousRemcosBrowse
                                    • 107.173.4.16
                                    INIT7CHfenty.arm4.elfGet hashmaliciousMiraiBrowse
                                    • 109.202.202.202
                                    CONSTANT_STRATEGY.elfGet hashmaliciousSliverBrowse
                                    • 109.202.202.202
                                    10000.elfGet hashmaliciousUnknownBrowse
                                    • 109.202.202.202
                                    la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                    • 109.202.202.202
                                    gnjqwpc.elfGet hashmaliciousMiraiBrowse
                                    • 109.202.202.202
                                    copy_netaddr.elfGet hashmaliciousXmrigBrowse
                                    • 109.202.202.202
                                    wiewa64.elfGet hashmaliciousMiraiBrowse
                                    • 109.202.202.202
                                    njvwa4.elfGet hashmaliciousMiraiBrowse
                                    • 109.202.202.202
                                    wrjkngh4.elfGet hashmaliciousMiraiBrowse
                                    • 109.202.202.202
                                    woega6.elfGet hashmaliciousMiraiBrowse
                                    • 109.202.202.202
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, Go BuildID=wHNpBASXUQTlIKIQT1Y7/b7VbUY7Gjk02LB7P0PXR/U8Aojfug2dk2HTUa_U2t/kT43g35hV1_VmqIOBlJn, stripped
                                    Entropy (8bit):6.226180706643571
                                    TrID:
                                    • ELF Executable and Linkable format (Linux) (4029/14) 49.77%
                                    • ELF Executable and Linkable format (generic) (4004/1) 49.46%
                                    • Lumena CEL bitmap (63/63) 0.78%
                                    File name:dbus.elf
                                    File size:4'948'120 bytes
                                    MD5:89282100982e5f4dc24ce6dff1690346
                                    SHA1:610a2ce20b7a81e059c9a79f6da19dd3fbd34fa0
                                    SHA256:ff0e1d1cd4f5cde24a3cb9ad571e92f8fa795aa9b42c829aeaeae2a6b8b020ae
                                    SHA512:0a665e856ffc66eefc3563da31a2b0aac1cc2eb4eba35d9b381282946d72e6bc530552f4e7bfcd3d4dd7a4824f8a566a39b05c57069f506a41d3be65df43e142
                                    SSDEEP:49152:mKGGrlmcbl3/hS/rybEXsyCjRqpPZ6s5x5EYhcguvW/j8dwi:QpcbhJLDRqP0yEYh/Yr
                                    TLSH:4A363B07EC9545E5C0AEE6318662D253BA717C485B3023D33FA0F7292F76BD0AAB9714
                                    File Content Preview:.ELF..............>.......F.....@...................@.8...@.............@.......@.@.....@.@.....P.......P.................................@.......@.....d.......d.................................@.......@.....{z#.....{z#.......................#.......c....

                                    ELF header

                                    Class:ELF64
                                    Data:2's complement, little endian
                                    Version:1 (current)
                                    Machine:Advanced Micro Devices X86-64
                                    Version Number:0x1
                                    Type:EXEC (Executable file)
                                    OS/ABI:UNIX - System V
                                    ABI Version:0
                                    Entry Point Address:0x46d9a0
                                    Flags:0x0
                                    ELF Header Size:64
                                    Program Header Offset:64
                                    Program Header Size:56
                                    Number of Program Headers:6
                                    Section Header Offset:400
                                    Section Header Size:64
                                    Number of Section Headers:14
                                    Header String Table Index:13
                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                    NULL0x00x00x00x00x0000
                                    .textPROGBITS0x4010000x10000x236a7b0x00x6AX0032
                                    .rodataPROGBITS0x6380000x2380000xf15670x00x2A0032
                                    .typelinkPROGBITS0x7295800x3295800x16680x00x2A0032
                                    .itablinkPROGBITS0x72ac000x32ac000x8480x00x2A0032
                                    .gosymtabPROGBITS0x72b4480x32b4480x00x00x2A001
                                    .gopclntabPROGBITS0x72b4600x32b4600x159cf00x00x2A0032
                                    .go.buildinfoPROGBITS0x8860000x4860000xf00x00x3WA0016
                                    .noptrdataPROGBITS0x8861000x4861000x268420x00x3WA0032
                                    .dataPROGBITS0x8ac9600x4ac9600xa9d00x00x3WA0032
                                    .bssNOBITS0x8b73400x4b73400x61d300x00x3WA0032
                                    .noptrbssNOBITS0x9190800x5190800x67000x00x3WA0032
                                    .note.go.buildidNOTE0x400f9c0xf9c0x640x00x2A004
                                    .shstrtabSTRTAB0x00x4b80000x980x00x0001
                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                    PHDR0x400x4000400x4000400x1500x1501.71170x4R 0x1000
                                    NOTE0xf9c0x400f9c0x400f9c0x640x645.25980x4R 0x4.note.go.buildid
                                    LOAD0x00x4000000x4000000x237a7b0x237a7b6.20060x5R E0x1000.text .note.go.buildid
                                    LOAD0x2380000x6380000x6380000x24d1500x24d1505.67260x4R 0x1000.rodata .typelink .itablink .gosymtab .gopclntab
                                    LOAD0x4860000x8860000x8860000x313400x997805.44710x6RW 0x1000.go.buildinfo .noptrdata .data .bss .noptrbss
                                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 20, 2024 17:40:54.127785921 CET43928443192.168.2.2391.189.91.42
                                    Dec 20, 2024 17:40:59.502840042 CET42836443192.168.2.2391.189.91.43
                                    Dec 20, 2024 17:40:59.537585020 CET583403693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:40:59.657471895 CET369358340107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:40:59.657752991 CET583403693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:40:59.660732985 CET583403693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:40:59.780672073 CET369358340107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:00.582024097 CET369358340107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:00.582667112 CET583403693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:00.584243059 CET583403693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:00.704132080 CET369358340107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:01.038614035 CET4251680192.168.2.23109.202.202.202
                                    Dec 20, 2024 17:41:14.837482929 CET583423693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:14.960921049 CET369358342107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:14.961124897 CET583423693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:14.963249922 CET583423693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:15.086863041 CET369358342107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:15.372618914 CET43928443192.168.2.2391.189.91.42
                                    Dec 20, 2024 17:41:16.013242006 CET369358342107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:16.015171051 CET583423693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:16.134895086 CET369358342107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:25.611309052 CET42836443192.168.2.2391.189.91.43
                                    Dec 20, 2024 17:41:29.773122072 CET583443693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:29.892784119 CET369358344107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:29.893099070 CET583443693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:29.895190001 CET583443693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:30.016489029 CET369358344107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:30.825978041 CET369358344107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:30.826339960 CET583443693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:30.828073978 CET583443693192.168.2.23107.172.88.151
                                    Dec 20, 2024 17:41:30.947871923 CET369358344107.172.88.151192.168.2.23
                                    Dec 20, 2024 17:41:31.754216909 CET4251680192.168.2.23109.202.202.202
                                    Dec 20, 2024 17:41:56.326914072 CET43928443192.168.2.2391.189.91.42
                                    Dec 20, 2024 17:42:16.803942919 CET42836443192.168.2.2391.189.91.43
                                    • 107.172.88.151:3693
                                    Session IDSource IPSource PortDestination IPDestination Port
                                    0192.168.2.2358340107.172.88.1513693
                                    TimestampBytes transferredDirectionData
                                    Dec 20, 2024 17:40:59.660732985 CET119OUTGET /get-url HTTP/1.1
                                    Host: 107.172.88.151:3693
                                    User-Agent: Go-http-client/1.1
                                    Accept-Encoding: gzip


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    1192.168.2.2358342107.172.88.1513693
                                    TimestampBytes transferredDirectionData
                                    Dec 20, 2024 17:41:14.963249922 CET119OUTGET /get-url HTTP/1.1
                                    Host: 107.172.88.151:3693
                                    User-Agent: Go-http-client/1.1
                                    Accept-Encoding: gzip


                                    Session IDSource IPSource PortDestination IPDestination Port
                                    2192.168.2.2358344107.172.88.1513693
                                    TimestampBytes transferredDirectionData
                                    Dec 20, 2024 17:41:29.895190001 CET119OUTGET /get-url HTTP/1.1
                                    Host: 107.172.88.151:3693
                                    User-Agent: Go-http-client/1.1
                                    Accept-Encoding: gzip


                                    System Behavior

                                    Start time (UTC):16:40:55
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:/tmp/dbus.elf
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:40:55
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:40:55
                                    Start date (UTC):20/12/2024
                                    Path:/bin/ps
                                    Arguments:ps axo pid,comm,pcpu
                                    File size:137688 bytes
                                    MD5 hash:ab48054475a6f70f8e7fa847331f3327

                                    Start time (UTC):16:40:57
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:40:57
                                    Start date (UTC):20/12/2024
                                    Path:/bin/pgrep
                                    Arguments:pgrep -x udiskssd
                                    File size:30968 bytes
                                    MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                    Start time (UTC):16:41:00
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:41:00
                                    Start date (UTC):20/12/2024
                                    Path:/bin/pgrep
                                    Arguments:pgrep -c udiskssd
                                    File size:30968 bytes
                                    MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                    Start time (UTC):16:41:10
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:41:10
                                    Start date (UTC):20/12/2024
                                    Path:/bin/ps
                                    Arguments:ps axo pid,comm,pcpu
                                    File size:137688 bytes
                                    MD5 hash:ab48054475a6f70f8e7fa847331f3327

                                    Start time (UTC):16:41:12
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:41:12
                                    Start date (UTC):20/12/2024
                                    Path:/bin/pgrep
                                    Arguments:pgrep -x udiskssd
                                    File size:30968 bytes
                                    MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                    Start time (UTC):16:41:15
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:41:15
                                    Start date (UTC):20/12/2024
                                    Path:/bin/pgrep
                                    Arguments:pgrep -c udiskssd
                                    File size:30968 bytes
                                    MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                    Start time (UTC):16:41:26
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:41:26
                                    Start date (UTC):20/12/2024
                                    Path:/bin/ps
                                    Arguments:ps axo pid,comm,pcpu
                                    File size:137688 bytes
                                    MD5 hash:ab48054475a6f70f8e7fa847331f3327

                                    Start time (UTC):16:41:27
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:41:27
                                    Start date (UTC):20/12/2024
                                    Path:/bin/pgrep
                                    Arguments:pgrep -x udiskssd
                                    File size:30968 bytes
                                    MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                    Start time (UTC):16:41:30
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:41:30
                                    Start date (UTC):20/12/2024
                                    Path:/bin/pgrep
                                    Arguments:pgrep -c udiskssd
                                    File size:30968 bytes
                                    MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                    Start time (UTC):16:41:40
                                    Start date (UTC):20/12/2024
                                    Path:/tmp/dbus.elf
                                    Arguments:-
                                    File size:4948120 bytes
                                    MD5 hash:89282100982e5f4dc24ce6dff1690346

                                    Start time (UTC):16:41:40
                                    Start date (UTC):20/12/2024
                                    Path:/bin/ps
                                    Arguments:ps axo pid,comm,pcpu
                                    File size:137688 bytes
                                    MD5 hash:ab48054475a6f70f8e7fa847331f3327