Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
nova2.elf

Overview

General Information

Sample name:nova2.elf
Analysis ID:1583784
MD5:b0d134b9c75044e24d810ecfa4b6970a
SHA1:f70d491ba1976846d25b65e353149eb09ef40164
SHA256:0e2aeb9b2f0e0ba891cda89feeb22e15b6c1ffae6f8ada5aab9ef585972440b9
Tags:elfxdr33user-smica83
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Sample contains only a LOAD segment without any section mappings
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1583784
Start date and time:2025-01-03 15:16:04 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:nova2.elf
Detection:MAL
Classification:mal48.linELF@0/0@0/0
Command:/tmp/nova2.elf
PID:6217
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • nova2.elf (PID: 6217, Parent: 6133, MD5: b0d134b9c75044e24d810ecfa4b6970a) Arguments: /tmp/nova2.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: nova2.elfVirustotal: Detection: 10%Perma Link
Source: nova2.elfReversingLabs: Detection: 13%
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: LOAD without section mappingsProgram segment: 0x8048000
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/0@0/0
Source: /tmp/nova2.elf (PID: 6217)File: /rw/.configJump to behavior
Source: /tmp/nova2.elf (PID: 6217)Empty hidden file: /rw/.configJump to behavior
Source: /tmp/nova2.elf (PID: 6217)Queries kernel information via 'uname': Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Hide Artifacts
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Hidden Files and Directories
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
nova2.elf11%VirustotalBrowse
nova2.elf13%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
91.189.91.43154.216.18.23-boatnet.arm7-2025-01-03T11_41_00.elfGet hashmaliciousMiraiBrowse
    g.elfGet hashmaliciousUnknownBrowse
      aarch643308.elfGet hashmaliciousUnknownBrowse
        ARMV7L.elfGet hashmaliciousUnknownBrowse
          bash.elfGet hashmaliciousUnknownBrowse
            ARMV5L.elfGet hashmaliciousUnknownBrowse
              boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                cedhatGet hashmaliciousKaijiBrowse
                  arc.elfGet hashmaliciousUnknownBrowse
                    m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                      91.189.91.42154.216.18.23-boatnet.arm7-2025-01-03T11_41_00.elfGet hashmaliciousMiraiBrowse
                        g.elfGet hashmaliciousUnknownBrowse
                          aarch643308.elfGet hashmaliciousUnknownBrowse
                            ARMV7L.elfGet hashmaliciousUnknownBrowse
                              bash.elfGet hashmaliciousUnknownBrowse
                                ARMV5L.elfGet hashmaliciousUnknownBrowse
                                  boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                    cedhatGet hashmaliciousKaijiBrowse
                                      arc.elfGet hashmaliciousUnknownBrowse
                                        m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CANONICAL-ASGB154.216.18.23-boatnet.arm7-2025-01-03T11_41_00.elfGet hashmaliciousMiraiBrowse
                                          • 91.189.91.42
                                          g.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          aarch643308.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          ARMV7L.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          bash.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          ARMV5L.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 91.189.91.42
                                          cedhatGet hashmaliciousKaijiBrowse
                                          • 91.189.91.42
                                          arc.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          i586.elfGet hashmaliciousMiraiBrowse
                                          • 185.125.190.26
                                          CANONICAL-ASGB154.216.18.23-boatnet.arm7-2025-01-03T11_41_00.elfGet hashmaliciousMiraiBrowse
                                          • 91.189.91.42
                                          g.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          aarch643308.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          ARMV7L.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          bash.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          ARMV5L.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 91.189.91.42
                                          cedhatGet hashmaliciousKaijiBrowse
                                          • 91.189.91.42
                                          arc.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          i586.elfGet hashmaliciousMiraiBrowse
                                          • 185.125.190.26
                                          INIT7CH154.216.18.23-boatnet.arm7-2025-01-03T11_41_00.elfGet hashmaliciousMiraiBrowse
                                          • 109.202.202.202
                                          g.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          aarch643308.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          ARMV7L.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          bash.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          ARMV5L.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 109.202.202.202
                                          cedhatGet hashmaliciousKaijiBrowse
                                          • 109.202.202.202
                                          arc.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          • 109.202.202.202
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                          Entropy (8bit):6.636864788119594
                                          TrID:
                                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                          File name:nova2.elf
                                          File size:614'820 bytes
                                          MD5:b0d134b9c75044e24d810ecfa4b6970a
                                          SHA1:f70d491ba1976846d25b65e353149eb09ef40164
                                          SHA256:0e2aeb9b2f0e0ba891cda89feeb22e15b6c1ffae6f8ada5aab9ef585972440b9
                                          SHA512:93f1b9a45b61ad56a70375aea7ac20ef116299afefd79b4897a3bb610ea915c6c3585b14501b1d52ac34c9f7a53250ccd20df71c8a1dee2f5f200f3faca7f1a4
                                          SSDEEP:12288:X8iWKFnlJY9P6DoKZLT6ViTN5U00TWHE1GdQacjha+Rcl3Llz7ph3u6tfUTQe:shKFlJY56DoILT6ViTN5zEMdQaLHlz72
                                          TLSH:92D45B0AFA92E872F171D0B1428ED772A524AD354117D053FF9F2E68B5392E08B5D32B
                                          File Content Preview:.ELF....................,...4....^......4. ...(..............................................................................@...@...Q...Q..........................\L..............................................Q.td............................R.td.......

                                          ELF header

                                          Class:ELF32
                                          Data:2's complement, little endian
                                          Version:1 (current)
                                          Machine:Intel 80386
                                          Version Number:0x1
                                          Type:EXEC (Executable file)
                                          OS/ABI:UNIX - System V
                                          ABI Version:0
                                          Entry Point Address:0x804972c
                                          Flags:0x0
                                          ELF Header Size:52
                                          Program Header Offset:52
                                          Program Header Size:32
                                          Number of Program Headers:7
                                          Section Header Offset:614100
                                          Section Header Size:40
                                          Number of Section Headers:18
                                          Header String Table Index:17
                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                          NULL0x00x00x00x00x0000
                                          .initPROGBITS0x80490000x10000x1c0x00x6AX001
                                          .textPROGBITS0x80490200x10200x6ab620x00x6AX0016
                                          .finiPROGBITS0x80b3b820x6bb820x170x00x6AX001
                                          .rodataPROGBITS0x80b40000x6c0000xfe200x00x2A0032
                                          .eh_framePROGBITS0x80c3e200x7be200x153880x00x2A004
                                          .gcc_except_tablePROGBITS0x80d91a80x911a80xe0x00x2A001
                                          .tdataPROGBITS0x80da1cc0x911cc0x40x00x403WAT004
                                          .tbssNOBITS0x80da1d00x911d00x80x00x403WAT004
                                          .ctorsPROGBITS0x80da1d00x911d00x80x00x3WA004
                                          .dtorsPROGBITS0x80da1d80x911d80x80x00x3WA004
                                          .data.rel.roPROGBITS0x80da1e00x911e00x2df00x00x3WA0032
                                          .gotPROGBITS0x80dcfd00x93fd00x200x00x3WA004
                                          .got.pltPROGBITS0x80dd0000x940000xc0x40x3WA004
                                          .dataPROGBITS0x80dd0200x940200x1e080x00x3WA0032
                                          .bssNOBITS0x80dee400x95e280x18d400x00x3WA0032
                                          .commentPROGBITS0x00x95e280x210x10x30MS001
                                          .shstrtabSTRTAB0x00x95e490x8b0x00x0001
                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                          LOAD0x00x80480000x80480000x1140x1143.36280x4R 0x1000
                                          LOAD0x10000x80490000x80490000x6ab990x6ab996.54700x5R E0x1000.init .text .fini
                                          LOAD0x6c0000x80b40000x80b40000x251b60x251b66.28320x4R 0x1000.rodata .eh_frame .gcc_except_table
                                          LOAD0x911cc0x80da1cc0x80da1cc0x4c5c0x1d9b44.63140x6RW 0x1000.tdata .tbss .ctors .dtors .data.rel.ro .got .got.plt .data .bss
                                          TLS0x911cc0x80da1cc0x80da1cc0x40xc2.00000x4R 0x4.tdata .tbss
                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
                                          GNU_RELRO0x911cc0x80da1cc0x80da1cc0x2e340x2e343.31260x4R 0x1.tdata .tbss .ctors .dtors .data.rel.ro .got
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 3, 2025 15:16:42.018202066 CET43928443192.168.2.2391.189.91.42
                                          Jan 3, 2025 15:16:47.393520117 CET42836443192.168.2.2391.189.91.43
                                          Jan 3, 2025 15:16:48.929330111 CET4251680192.168.2.23109.202.202.202
                                          Jan 3, 2025 15:17:03.007267952 CET43928443192.168.2.2391.189.91.42
                                          Jan 3, 2025 15:17:13.245958090 CET42836443192.168.2.2391.189.91.43
                                          Jan 3, 2025 15:17:19.389045000 CET4251680192.168.2.23109.202.202.202
                                          Jan 3, 2025 15:17:43.961571932 CET43928443192.168.2.2391.189.91.42
                                          Jan 3, 2025 15:18:04.438611031 CET42836443192.168.2.2391.189.91.43

                                          System Behavior

                                          Start time (UTC):14:16:39
                                          Start date (UTC):03/01/2025
                                          Path:/tmp/nova2.elf
                                          Arguments:/tmp/nova2.elf
                                          File size:614820 bytes
                                          MD5 hash:b0d134b9c75044e24d810ecfa4b6970a