Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
dlr.arm5.elf

Overview

General Information

Sample name:dlr.arm5.elf
Analysis ID:1582122
MD5:1c73a72a902f2080907f0fad12f1ac15
SHA1:cb3731d511f233869567b1f44f73a59bce1cb891
SHA256:54983a75fbca02132dc3a2e8a5860e8e40c1ced4148aa164e2fd9c61f0717403
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system version information
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1582122
Start date and time:2024-12-30 02:30:24 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:dlr.arm5.elf
Detection:MAL
Classification:mal48.linELF@0/0@2/0
Command:/tmp/dlr.arm5.elf
PID:5717
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • dlr.arm5.elf (PID: 5717, Parent: 5525, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/dlr.arm5.elf
  • systemd New Fork (PID: 5788, Parent: 1)
  • snap-failure (PID: 5788, Parent: 1, MD5: 69136a7d575731ce62349f2e4d3e5c36) Arguments: /usr/lib/snapd/snap-failure snapd
    • systemctl (PID: 5802, Parent: 5788, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop snapd.socket
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: dlr.arm5.elfVirustotal: Detection: 30%Perma Link
Source: dlr.arm5.elfReversingLabs: Detection: 44%
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/0@2/0
Source: /usr/lib/snapd/snap-failure (PID: 5802)Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socketJump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5788)Reads version info: /proc/versionJump to behavior
Source: /tmp/dlr.arm5.elf (PID: 5717)Queries kernel information via 'uname': Jump to behavior
Source: dlr.arm5.elf, 5717.1.00007fff7f4ff000.00007fff7f520000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/dlr.arm5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/dlr.arm5.elf
Source: dlr.arm5.elf, 5717.1.0000557c8e61d000.0000557c8e729000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: dlr.arm5.elf, 5717.1.00007fff7f4ff000.00007fff7f520000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: dlr.arm5.elf, 5717.1.0000557c8e61d000.0000557c8e729000.rw-.sdmpBinary or memory string: |U!/etc/qemu-binfmt/arm
Source: dlr.arm5.elf, 5717.1.0000557c8e61d000.0000557c8e729000.rw-.sdmpBinary or memory string: rg.qemu.gdb.arm.sys.regs">
Source: dlr.arm5.elf, 5717.1.0000557c8e61d000.0000557c8e729000.rw-.sdmpBinary or memory string: |Urg.qemu.gdb.arm.sys.regs">
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Systemd Service
1
Systemd Service
Direct Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582122 Sample: dlr.arm5.elf Startdate: 30/12/2024 Architecture: LINUX Score: 48 15 daisy.ubuntu.com 2->15 17 Multi AV Scanner detection for submitted file 2->17 7 systemd snap-failure 2->7         started        9 dlr.arm5.elf 2->9         started        signatures3 process4 process5 11 snap-failure systemctl 7->11         started        13 snap-failure 7->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
dlr.arm5.elf30%VirustotalBrowse
dlr.arm5.elf45%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    No contacted IP infos
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    daisy.ubuntu.comrebirth.arm5.elfGet hashmaliciousGafgytBrowse
    • 162.213.35.24
    rebirth.i686.elfGet hashmaliciousGafgytBrowse
    • 162.213.35.25
    loligang.m68k.elfGet hashmaliciousMiraiBrowse
    • 162.213.35.24
    dlr.arm.elfGet hashmaliciousUnknownBrowse
    • 162.213.35.25
    loligang.arm5.elfGet hashmaliciousMiraiBrowse
    • 162.213.35.24
    loligang.arm6.elfGet hashmaliciousMiraiBrowse
    • 162.213.35.24
    mips.elfGet hashmaliciousMirai, MoobotBrowse
    • 162.213.35.25
    sh4.elfGet hashmaliciousMirai, MoobotBrowse
    • 162.213.35.25
    x86.elfGet hashmaliciousMirai, MoobotBrowse
    • 162.213.35.25
    x86_64.elfGet hashmaliciousMirai, MoobotBrowse
    • 162.213.35.25
    No context
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
    Entropy (8bit):4.956491755003687
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:dlr.arm5.elf
    File size:1'156 bytes
    MD5:1c73a72a902f2080907f0fad12f1ac15
    SHA1:cb3731d511f233869567b1f44f73a59bce1cb891
    SHA256:54983a75fbca02132dc3a2e8a5860e8e40c1ced4148aa164e2fd9c61f0717403
    SHA512:7572eb66343e12ae724a46cb90723b54f27e97ef9c44f6e8834dc20652b3cb8d336cded9e16a52a09fb595cd37928b8723a528453f8995a1d21f3e826e354850
    SSDEEP:24:JColMlgP9qD0at6EoKGRrUlFSy40VzLCkIddx2HuGID1Nfc7:JColMOFqDPtsrkFSy4CzLmGIZNy
    TLSH:02219B9AA7D36D2BCC540277DCAF5710E362AE84869EF513F32216190C6E31A5F2118A
    File Content Preview:.ELF...a..........(.........4...........4. ...(..................................................................................0...$.......,... ...<.......4.. ..."....<.......................................................0... ............-...M........

    ELF header

    Class:ELF32
    Data:2's complement, little endian
    Version:1 (current)
    Machine:ARM
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:ARM - ABI
    ABI Version:0
    Entry Point Address:0x831c
    Flags:0x2
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:2
    Section Header Offset:956
    Section Header Size:40
    Number of Section Headers:5
    Header String Table Index:4
    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
    NULL0x00x00x00x00x0000
    .textPROGBITS0x80740x740x2e80x00x6AX004
    .rodataPROGBITS0x835c0x35c0x400x10x32AMS004
    .bssNOBITS0x1039c0x39c0x80x00x3WA004
    .shstrtabSTRTAB0x00x39c0x1e0x00x0001
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x80000x80000x39c0x39c5.35450x5R E0x8000.text .rodata
    LOAD0x39c0x1039c0x1039c0x00x80.00000x6RW 0x8000.bss
    TimestampSource PortDest PortSource IPDest IP
    Dec 30, 2024 02:31:58.403951883 CET3480053192.168.2.138.8.8.8
    Dec 30, 2024 02:31:58.408915043 CET53348008.8.8.8192.168.2.13
    Dec 30, 2024 02:31:58.408983946 CET3480053192.168.2.138.8.8.8
    Dec 30, 2024 02:31:58.409003973 CET3480053192.168.2.138.8.8.8
    Dec 30, 2024 02:31:58.409014940 CET3480053192.168.2.138.8.8.8
    Dec 30, 2024 02:31:58.413831949 CET53348008.8.8.8192.168.2.13
    Dec 30, 2024 02:31:58.413855076 CET53348008.8.8.8192.168.2.13
    Dec 30, 2024 02:31:58.865580082 CET53348008.8.8.8192.168.2.13
    Dec 30, 2024 02:31:58.865825891 CET3480053192.168.2.138.8.8.8
    Dec 30, 2024 02:31:58.991913080 CET53348008.8.8.8192.168.2.13
    Dec 30, 2024 02:31:58.992160082 CET3480053192.168.2.138.8.8.8
    Dec 30, 2024 02:32:00.864934921 CET53348008.8.8.8192.168.2.13
    Dec 30, 2024 02:32:00.865346909 CET3480053192.168.2.138.8.8.8
    Dec 30, 2024 02:32:00.870290041 CET53348008.8.8.8192.168.2.13
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Dec 30, 2024 02:31:58.409003973 CET192.168.2.138.8.8.80xba7Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
    Dec 30, 2024 02:31:58.409014940 CET192.168.2.138.8.8.80x9c08Standard query (0)daisy.ubuntu.com28IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Dec 30, 2024 02:31:58.865580082 CET8.8.8.8192.168.2.130xba7No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
    Dec 30, 2024 02:31:58.865580082 CET8.8.8.8192.168.2.130xba7No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

    System Behavior

    Start time (UTC):01:31:56
    Start date (UTC):30/12/2024
    Path:/tmp/dlr.arm5.elf
    Arguments:/tmp/dlr.arm5.elf
    File size:4956856 bytes
    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

    Start time (UTC):01:32:38
    Start date (UTC):30/12/2024
    Path:/usr/lib/systemd/systemd
    Arguments:-
    File size:1620224 bytes
    MD5 hash:9b2bec7092a40488108543f9334aab75

    Start time (UTC):01:32:38
    Start date (UTC):30/12/2024
    Path:/usr/lib/snapd/snap-failure
    Arguments:/usr/lib/snapd/snap-failure snapd
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36

    Start time (UTC):01:32:38
    Start date (UTC):30/12/2024
    Path:/usr/lib/snapd/snap-failure
    Arguments:-
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36

    Start time (UTC):01:32:38
    Start date (UTC):30/12/2024
    Path:/usr/bin/systemctl
    Arguments:systemctl stop snapd.socket
    File size:996584 bytes
    MD5 hash:4deddfb6741481f68aeac522cc26ff4b

    Start time (UTC):01:32:38
    Start date (UTC):30/12/2024
    Path:/usr/lib/snapd/snap-failure
    Arguments:-
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36