Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
212.64.215.71-arm-2024-12-25T12_31_55.elf

Overview

General Information

Sample name:212.64.215.71-arm-2024-12-25T12_31_55.elf
Analysis ID:1580636
MD5:23b441ea50afee3f1aa1a0872361fef8
SHA1:4a2f2838a9a712e5d502d44af335315500c25ce3
SHA256:1b44454ddbab75b15db0a00ea6c26878732eda93ffb648cd9db334e80c249308
Tags:elfuser-threatquery
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1580636
Start date and time:2024-12-25 13:40:07 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:212.64.215.71-arm-2024-12-25T12_31_55.elf
Detection:MAL
Classification:mal56.linELF@0/0@2/0
Command:/tmp/212.64.215.71-arm-2024-12-25T12_31_55.elf
PID:5489
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
$UICIDEBOY$
Standard Error:
  • system is lnxubuntu20
  • cleanup
No yara matches
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-25T13:40:58.053767+010028498161A Network Trojan was detected192.168.2.145076285.239.34.1346666TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 212.64.215.71-arm-2024-12-25T12_31_55.elfReversingLabs: Detection: 28%

Networking

barindex
Source: Network trafficSuricata IDS: 2849816 - Severity 1 - ETPRO MALWARE ELF/Multiverze CnC Checkin : 192.168.2.14:50762 -> 85.239.34.134:6666
Source: global trafficTCP traffic: 192.168.2.14:50762 -> 85.239.34.134:6666
Source: /tmp/212.64.215.71-arm-2024-12-25T12_31_55.elf (PID: 5489)Socket: 0.0.0.0:9902Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.linELF@0/0@2/0
Source: /tmp/212.64.215.71-arm-2024-12-25T12_31_55.elf (PID: 5489)Queries kernel information via 'uname': Jump to behavior
Source: 212.64.215.71-arm-2024-12-25T12_31_55.elf, 5489.1.00005615d5ccf000.00005615d5dfd000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: 212.64.215.71-arm-2024-12-25T12_31_55.elf, 5489.1.00007ffc519f2000.00007ffc51a13000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/212.64.215.71-arm-2024-12-25T12_31_55.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/212.64.215.71-arm-2024-12-25T12_31_55.elf
Source: 212.64.215.71-arm-2024-12-25T12_31_55.elf, 5489.1.00005615d5ccf000.00005615d5dfd000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/arm
Source: 212.64.215.71-arm-2024-12-25T12_31_55.elf, 5489.1.00007ffc519f2000.00007ffc51a13000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
212.64.215.71-arm-2024-12-25T12_31_55.elf29%ReversingLabsLinux.Backdoor.Gafgyt
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    85.239.34.134
    unknownRussian Federation
    134121RAINBOW-HKRainbownetworklimitedHKtrue
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    85.239.34.134ppc.elfGet hashmaliciousMiraiBrowse
      sh4.elfGet hashmaliciousMiraiBrowse
        mips.elfGet hashmaliciousMiraiBrowse
          spc.elfGet hashmaliciousMiraiBrowse
            arm6.elfGet hashmaliciousMiraiBrowse
              arm.elfGet hashmaliciousMiraiBrowse
                m68k.elfGet hashmaliciousMiraiBrowse
                  arm7.elfGet hashmaliciousMiraiBrowse
                    x86.elfGet hashmaliciousMiraiBrowse
                      mpsl.elfGet hashmaliciousMiraiBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.comarm5.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        Space.spc.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        byte.x86.elfGet hashmaliciousMirai, OkiruBrowse
                        • 162.213.35.24
                        armv7l.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        armv4l.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        loligang.m68k.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        loligang.arm5.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        loligang.arm6.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        x86_32.nn.elfGet hashmaliciousOkiruBrowse
                        • 162.213.35.24
                        arm.nn-20241224-0652.elfGet hashmaliciousOkiruBrowse
                        • 162.213.35.24
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        RAINBOW-HKRainbownetworklimitedHKarmv5l.elfGet hashmaliciousUnknownBrowse
                        • 185.152.92.158
                        statmentt.exeGet hashmaliciousScreenConnect ToolBrowse
                        • 85.239.34.190
                        ppc.elfGet hashmaliciousMiraiBrowse
                        • 85.239.34.134
                        sh4.elfGet hashmaliciousMiraiBrowse
                        • 85.239.34.134
                        mips.elfGet hashmaliciousMiraiBrowse
                        • 85.239.34.134
                        spc.elfGet hashmaliciousMiraiBrowse
                        • 85.239.34.134
                        arm6.elfGet hashmaliciousMiraiBrowse
                        • 85.239.34.134
                        arm.elfGet hashmaliciousMiraiBrowse
                        • 85.239.34.134
                        m68k.elfGet hashmaliciousMiraiBrowse
                        • 85.239.34.134
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 85.239.34.134
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                        Entropy (8bit):5.743860940051087
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:212.64.215.71-arm-2024-12-25T12_31_55.elf
                        File size:29'920 bytes
                        MD5:23b441ea50afee3f1aa1a0872361fef8
                        SHA1:4a2f2838a9a712e5d502d44af335315500c25ce3
                        SHA256:1b44454ddbab75b15db0a00ea6c26878732eda93ffb648cd9db334e80c249308
                        SHA512:5142086f908cd8189264159b4f6e7160f284bce1b9a0b45ab3b228748f32c29a91ca0f7a59deb15a098532b76dea77d77f3787285db8e8fbad285bbf8dc19f0d
                        SSDEEP:768:F9wSdZY3uM2rdPbUdaCbMNFzTl9rTxo/DGwyq3VMa9:3wOCV2rV4d/KFvPrTxQGwy
                        TLSH:23D2E841F9D7DE16C6C15177BB0F038D772AD758F2EE7603AA2A2F7123A75260A36006
                        File Content Preview:.ELF...a..........(.........4....r......4. ...(......................n...n...............p..........h...<&..........Q.td..................................-...L."...R...........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:ARM
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:ARM - ABI
                        ABI Version:0
                        Entry Point Address:0x8190
                        Flags:0x202
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:29400
                        Section Header Size:40
                        Number of Section Headers:13
                        Header String Table Index:12
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x80940x940x180x00x6AX004
                        .textPROGBITS0x80b00xb00x69800x00x6AX0016
                        .finiPROGBITS0xea300x6a300x140x00x6AX004
                        .rodataPROGBITS0xea440x6a440x4940x00x2A004
                        .eh_framePROGBITS0xf0000x70000x40x00x3WA004
                        .ctorsPROGBITS0xf0040x70040x80x00x3WA004
                        .dtorsPROGBITS0xf00c0x700c0x80x00x3WA004
                        .jcrPROGBITS0xf0140x70140x40x00x3WA004
                        .dataPROGBITS0xf0180x70180x2500x00x3WA004
                        .bssNOBITS0xf2680x72680x23d40x00x3WA004
                        .ARM.attributesARM_ATTRIBUTES0x00x72680x100x00x0001
                        .shstrtabSTRTAB0x00x72780x5d0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x80000x80000x6ed80x6ed85.83600x5R E0x1000.init .text .fini .rodata
                        LOAD0x70000xf0000xf0000x2680x263c3.16840x6RW 0x1000.eh_frame .ctors .dtors .jcr .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-12-25T13:40:58.053767+01002849816ETPRO MALWARE ELF/Multiverze CnC Checkin1192.168.2.145076285.239.34.1346666TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 25, 2024 13:40:57.930380106 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:40:58.050756931 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:40:58.050838947 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:40:58.053766966 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:40:58.173223972 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:03.652107954 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:03.652554989 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:41:03.652672052 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:41:03.772108078 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:06.469378948 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:06.469484091 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:41:06.469511032 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:41:06.589044094 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:21.505758047 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:21.506063938 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:41:21.506064892 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:41:21.625673056 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:36.605140924 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:36.605557919 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:41:36.725193024 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:51.747798920 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:41:51.748696089 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:41:51.868421078 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:42:03.674971104 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:42:03.675729990 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:42:03.795289040 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:42:21.783339024 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:42:21.784385920 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:42:21.904356956 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:42:36.874929905 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:42:36.875354052 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:42:36.995102882 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:42:51.852629900 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:42:51.853240013 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:42:51.972919941 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:43:03.756145954 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:43:03.757210016 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:43:03.876991987 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:43:06.873992920 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:43:06.874536037 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:43:06.994292021 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:43:36.991149902 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:43:36.991653919 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:43:37.111905098 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:44:03.797648907 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:44:03.798662901 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:44:03.918309927 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:44:07.178637028 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:44:07.179100037 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:44:07.299068928 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:44:22.184225082 CET66665076285.239.34.134192.168.2.14
                        Dec 25, 2024 13:44:22.184889078 CET507626666192.168.2.1485.239.34.134
                        Dec 25, 2024 13:44:22.304713964 CET66665076285.239.34.134192.168.2.14
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 25, 2024 13:43:42.604939938 CET3971353192.168.2.141.1.1.1
                        Dec 25, 2024 13:43:42.604993105 CET4095553192.168.2.141.1.1.1
                        Dec 25, 2024 13:43:42.742223978 CET53397131.1.1.1192.168.2.14
                        Dec 25, 2024 13:43:42.743185997 CET53409551.1.1.1192.168.2.14
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 25, 2024 13:43:42.604939938 CET192.168.2.141.1.1.10x330cStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Dec 25, 2024 13:43:42.604993105 CET192.168.2.141.1.1.10xfda4Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 25, 2024 13:43:42.742223978 CET1.1.1.1192.168.2.140x330cNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                        Dec 25, 2024 13:43:42.742223978 CET1.1.1.1192.168.2.140x330cNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):12:40:57
                        Start date (UTC):25/12/2024
                        Path:/tmp/212.64.215.71-arm-2024-12-25T12_31_55.elf
                        Arguments:/tmp/212.64.215.71-arm-2024-12-25T12_31_55.elf
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):12:40:57
                        Start date (UTC):25/12/2024
                        Path:/tmp/212.64.215.71-arm-2024-12-25T12_31_55.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1