Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
rebirth.arm4.elf

Overview

General Information

Sample name:rebirth.arm4.elf
Analysis ID:1582123
MD5:8b3add14c03e44994a8687b04586784c
SHA1:e9e69f14253bd82bf0e555335115eb25412eb094
SHA256:34dc3e69779852517064b1ffd5464825a07f8e727568b49735e51ca3a7c617a9
Tags:elfuser-abuse_ch
Infos:

Detection

Gafgyt
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Opens /proc/net/* files useful for finding connected devices and routers
Detected TCP or UDP traffic on non-standard ports
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1582123
Start date and time:2024-12-30 02:34:23 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 13s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:rebirth.arm4.elf
Detection:MAL
Classification:mal76.spre.troj.linELF@0/0@2/0
  • VT rate limit hit for: 87.120.113.63:666
Command:/tmp/rebirth.arm4.elf
PID:5839
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
SourceRuleDescriptionAuthorStrings
rebirth.arm4.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: rebirth.arm4.elfAvira: detected
    Source: rebirth.arm4.elfMalware Configuration Extractor: Gafgyt {"C2 url": "87.120.113.63:666"}
    Source: rebirth.arm4.elfVirustotal: Detection: 60%Perma Link
    Source: rebirth.arm4.elfReversingLabs: Detection: 65%

    Spreading

    barindex
    Source: /tmp/rebirth.arm4.elf (PID: 5839)Opens: /proc/net/routeJump to behavior
    Source: global trafficTCP traffic: 192.168.2.15:33370 -> 87.120.113.63:666
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: unknownTCP traffic detected without corresponding DNS query: 87.120.113.63
    Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
    Source: classification engineClassification label: mal76.spre.troj.linELF@0/0@2/0
    Source: /tmp/rebirth.arm4.elf (PID: 5839)Queries kernel information via 'uname': Jump to behavior
    Source: rebirth.arm4.elf, 5839.1.00005582a0c4b000.00005582a0d79000.rw-.sdmp, rebirth.arm4.elf, 5841.1.00005582a0c4b000.00005582a0d79000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
    Source: rebirth.arm4.elf, 5839.1.00005582a0c4b000.00005582a0d79000.rw-.sdmp, rebirth.arm4.elf, 5841.1.00005582a0c4b000.00005582a0d79000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
    Source: rebirth.arm4.elf, 5839.1.00007fffb78ba000.00007fffb78db000.rw-.sdmp, rebirth.arm4.elf, 5841.1.00007fffb78ba000.00007fffb78db000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
    Source: rebirth.arm4.elf, 5839.1.00007fffb78ba000.00007fffb78db000.rw-.sdmp, rebirth.arm4.elf, 5841.1.00007fffb78ba000.00007fffb78db000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/rebirth.arm4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/rebirth.arm4.elf

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: rebirth.arm4.elf, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: rebirth.arm4.elf, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
    Security Software Discovery
    Remote ServicesData from Local System1
    Non-Standard Port
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
    Remote System Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    {"C2 url": "87.120.113.63:666"}
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    rebirth.arm4.elf60%VirustotalBrowse
    rebirth.arm4.elf66%ReversingLabsLinux.Backdoor.Gafgyt
    rebirth.arm4.elf100%AviraLINUX/Gafgyt.opnd
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    daisy.ubuntu.com
    162.213.35.24
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      87.120.113.63:666true
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        87.120.113.63
        unknownBulgaria
        25206UNACS-AS-BG8000BurgasBGtrue
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        87.120.113.63rebirth.i686.elfGet hashmaliciousGafgytBrowse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          daisy.ubuntu.comdlr.arm5.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.24
          rebirth.arm5.elfGet hashmaliciousGafgytBrowse
          • 162.213.35.24
          rebirth.i686.elfGet hashmaliciousGafgytBrowse
          • 162.213.35.25
          loligang.m68k.elfGet hashmaliciousMiraiBrowse
          • 162.213.35.24
          dlr.arm.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.25
          loligang.arm5.elfGet hashmaliciousMiraiBrowse
          • 162.213.35.24
          loligang.arm6.elfGet hashmaliciousMiraiBrowse
          • 162.213.35.24
          mips.elfGet hashmaliciousMirai, MoobotBrowse
          • 162.213.35.25
          sh4.elfGet hashmaliciousMirai, MoobotBrowse
          • 162.213.35.25
          x86.elfGet hashmaliciousMirai, MoobotBrowse
          • 162.213.35.25
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          UNACS-AS-BG8000BurgasBGrebirth.i686.elfGet hashmaliciousGafgytBrowse
          • 87.120.113.63
          LPO-0048532025.lnkGet hashmaliciousDarkVision RatBrowse
          • 87.120.113.91
          39382629.exeGet hashmaliciousRedLineBrowse
          • 87.120.120.7
          bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 87.120.112.234
          bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 87.120.112.234
          bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 87.120.112.234
          bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 87.120.112.234
          arm7.elfGet hashmaliciousMiraiBrowse
          • 87.120.114.32
          x86_64.elfGet hashmaliciousMiraiBrowse
          • 87.120.114.32
          bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 87.120.112.234
          No context
          No context
          No created / dropped files found
          File type:
          Entropy (8bit):5.90616927029017
          TrID:
          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
          File name:rebirth.arm4.elf
          File size:111'561 bytes
          MD5:8b3add14c03e44994a8687b04586784c
          SHA1:e9e69f14253bd82bf0e555335115eb25412eb094
          SHA256:34dc3e69779852517064b1ffd5464825a07f8e727568b49735e51ca3a7c617a9
          SHA512:f416e22b3a92902c69d372482e4f3017cc22d3df7bdc356e10d345a1c123df7561f02a54089d0261c5b742be0d336cffa45dd23ca80d45333987b5c32c2050c0
          SSDEEP:3072:HgvUxOcKFN+B9Jy8D3XvpIhfX44CHz9cm7QnKQXaeW:HDEKXy8rvOFX44CZcm7QnKGaeW
          TLSH:3EB30741D6548627C2D32B7BAB9F438D3336AA54A7E733195528BFF03BC27981E3A111
          File Content Preview:.ELF...a..........(.........4...lB......4. ...(.......................................... ... ... .......i..........Q.td..................................-...L."....@..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S
          TimestampSource PortDest PortSource IPDest IP
          Dec 30, 2024 02:35:29.605858088 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:35:29.611546040 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:35:29.611598015 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:35:29.612641096 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:35:29.617530107 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:35:40.914956093 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:35:40.915015936 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:35:40.915024996 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:35:40.915242910 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:35:40.915244102 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:35:40.915244102 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:36:40.649950027 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:36:40.650054932 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:36:40.775428057 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:36:40.775492907 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:37:40.658497095 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:37:40.658729076 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:37:40.776647091 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:37:40.776773930 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:38:15.317630053 CET5576653192.168.2.158.8.8.8
          Dec 30, 2024 02:38:15.322465897 CET53557668.8.8.8192.168.2.15
          Dec 30, 2024 02:38:15.322525024 CET5576653192.168.2.158.8.8.8
          Dec 30, 2024 02:38:15.322551966 CET5576653192.168.2.158.8.8.8
          Dec 30, 2024 02:38:15.322573900 CET5576653192.168.2.158.8.8.8
          Dec 30, 2024 02:38:15.327322960 CET53557668.8.8.8192.168.2.15
          Dec 30, 2024 02:38:15.327336073 CET53557668.8.8.8192.168.2.15
          Dec 30, 2024 02:38:15.750531912 CET53557668.8.8.8192.168.2.15
          Dec 30, 2024 02:38:15.750606060 CET5576653192.168.2.158.8.8.8
          Dec 30, 2024 02:38:15.878941059 CET53557668.8.8.8192.168.2.15
          Dec 30, 2024 02:38:15.878983974 CET5576653192.168.2.158.8.8.8
          Dec 30, 2024 02:38:17.750606060 CET53557668.8.8.8192.168.2.15
          Dec 30, 2024 02:38:17.750888109 CET5576653192.168.2.158.8.8.8
          Dec 30, 2024 02:38:17.755738974 CET53557668.8.8.8192.168.2.15
          Dec 30, 2024 02:38:40.666809082 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:38:40.667069912 CET33370666192.168.2.1587.120.113.63
          Dec 30, 2024 02:38:40.793420076 CET6663337087.120.113.63192.168.2.15
          Dec 30, 2024 02:38:40.793694019 CET33370666192.168.2.1587.120.113.63
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Dec 30, 2024 02:38:15.322551966 CET192.168.2.158.8.8.80x788aStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
          Dec 30, 2024 02:38:15.322573900 CET192.168.2.158.8.8.80xd92Standard query (0)daisy.ubuntu.com28IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 30, 2024 02:38:15.750531912 CET8.8.8.8192.168.2.150x788aNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
          Dec 30, 2024 02:38:15.750531912 CET8.8.8.8192.168.2.150x788aNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

          System Behavior

          Start time (UTC):01:35:28
          Start date (UTC):30/12/2024
          Path:/tmp/rebirth.arm4.elf
          Arguments:/tmp/rebirth.arm4.elf
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

          Start time (UTC):01:35:28
          Start date (UTC):30/12/2024
          Path:/tmp/rebirth.arm4.elf
          Arguments:-
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

          Start time (UTC):01:35:28
          Start date (UTC):30/12/2024
          Path:/tmp/rebirth.arm4.elf
          Arguments:-
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1