Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
Space.arm6.elf

Overview

General Information

Sample name:Space.arm6.elf
Analysis ID:1584135
MD5:f7d52bf44e7646d04e9df69f3bc326fc
SHA1:ccce278135576d903c81470fda6354a7b793328d
SHA256:bd0ee3eef9a1e02ff12ab0347a5117e19b0a4fa15fdb0ac8d6bfb1df0a414f17
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories
HTTP GET or POST without a user agent
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584135
Start date and time:2025-01-04 13:07:11 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 32s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Space.arm6.elf
Detection:MAL
Classification:mal48.linELF@0/0@0/0
  • VT rate limit hit for: Space.arm6.elf
Command:/tmp/Space.arm6.elf
PID:5517
Exit Code:4
Exit Code Info:
Killed:False
Standard Output:
LIZRD
Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 5506, Parent: 3676)
  • rm (PID: 5506, Parent: 3676, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.b8AVVSacLJ /tmp/tmp.ycEs7ZfI5d /tmp/tmp.jFMq66eJaI
  • dash New Fork (PID: 5507, Parent: 3676)
  • rm (PID: 5507, Parent: 3676, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.b8AVVSacLJ /tmp/tmp.ycEs7ZfI5d /tmp/tmp.jFMq66eJaI
  • Space.arm6.elf (PID: 5517, Parent: 5440, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/Space.arm6.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Space.arm6.elfReversingLabs: Detection: 36%
Source: global trafficHTTP traffic detected: GET /hiddenbin/Space.arm6 HTTP/1.Data Raw: Data Ascii:
Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
Source: global trafficHTTP traffic detected: GET /hiddenbin/Space.arm6 HTTP/1.Data Raw: Data Ascii:
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 5506)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.b8AVVSacLJ /tmp/tmp.ycEs7ZfI5d /tmp/tmp.jFMq66eJaIJump to behavior
Source: /usr/bin/dash (PID: 5507)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.b8AVVSacLJ /tmp/tmp.ycEs7ZfI5d /tmp/tmp.jFMq66eJaIJump to behavior
Source: /tmp/Space.arm6.elf (PID: 5517)Queries kernel information via 'uname': Jump to behavior
Source: Space.arm6.elf, 5517.1.00007ffc5d5ef000.00007ffc5d610000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/Space.arm6.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Space.arm6.elf
Source: Space.arm6.elf, 5517.1.0000561464715000.0000561464843000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: Space.arm6.elf, 5517.1.00007ffc5d5ef000.00007ffc5d610000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: Space.arm6.elf, 5517.1.0000561464715000.0000561464843000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Space.arm6.elf37%ReversingLabsLinux.Downloader.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
79.133.46.252
unknownGermany
203833AT-FIRSTCOLOAustriaATfalse
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
AT-FIRSTCOLOAustriaATmips.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 79.133.33.157
SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeGet hashmaliciousUnknownBrowse
  • 159.100.29.29
SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeGet hashmaliciousUnknownBrowse
  • 159.100.29.29
boatnet.mips.elfGet hashmaliciousMiraiBrowse
  • 79.133.46.243
YIztve8dU8.elfGet hashmaliciousMiraiBrowse
  • 79.133.46.243
fSLSu3PQPC.elfGet hashmaliciousMiraiBrowse
  • 79.133.46.243
3kMnPQIVHR.elfGet hashmaliciousMiraiBrowse
  • 79.133.46.243
F4ged15cJ3.elfGet hashmaliciousMiraiBrowse
  • 79.133.46.243
cZlRw8OG35.elfGet hashmaliciousMiraiBrowse
  • 79.133.46.243
j0GmmzdQRz.elfGet hashmaliciousMiraiBrowse
  • 79.133.46.243
No context
No context
No created / dropped files found
File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
Entropy (8bit):4.8630317850218105
TrID:
  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
File name:Space.arm6.elf
File size:1'452 bytes
MD5:f7d52bf44e7646d04e9df69f3bc326fc
SHA1:ccce278135576d903c81470fda6354a7b793328d
SHA256:bd0ee3eef9a1e02ff12ab0347a5117e19b0a4fa15fdb0ac8d6bfb1df0a414f17
SHA512:c85475c0adb45987aec0c5e2efc0808a9bf7c779825b9a2369699d9f529811a0bc8a627be50245c15f9aa2cba26a571d0fcef8756b8e0731c70cfea600bf655d
SSDEEP:24:LKGpa7Urz/jlf5XK1G9Vev3gRGD9iMC/NBuMRjVlxrR+zLLh4:LKGpa7UrLZuR3iNBuOjVlxrsLLh
TLSH:6231119153D05DB9CDE451BFEE564310B365AF84E0CB3263A2187718BD2DE7C6C2604A
File Content Preview:.ELF..............(.........4...........4. ...(.....................D...D...............D...D...D...................Q.td.........................................8...<...4...........(.."...#...../...-.......M.................../...-.......M................

ELF header

Class:ELF32
Data:2's complement, little endian
Version:1 (current)
Machine:ARM
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x8388
Flags:0x4000002
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:3
Section Header Offset:1172
Section Header Size:40
Number of Section Headers:7
Header String Table Index:6
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.textPROGBITS0x80a00xa00x35c0x00x6AX0016
.rodataPROGBITS0x83fc0x3fc0x480x10x32AMS004
.gotPROGBITS0x104440x4440xc0x40x3WA004
.bssNOBITS0x104500x4500x80x00x3WA004
.ARM.attributesARM_ATTRIBUTES0x00x4500x100x00x0001
.shstrtabSTRTAB0x00x4600x330x00x0001
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x80000x80000x4440x4445.30310x5R E0x8000.text .rodata
LOAD0x4440x104440x104440xc0x140.00000x6RW 0x8000.got .bss
GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
TimestampSource PortDest PortSource IPDest IP
Jan 4, 2025 13:07:50.623688936 CET3846480192.168.2.1579.133.46.252
Jan 4, 2025 13:07:50.628657103 CET803846479.133.46.252192.168.2.15
Jan 4, 2025 13:07:50.628726006 CET3846480192.168.2.1579.133.46.252
Jan 4, 2025 13:07:50.629430056 CET3846480192.168.2.1579.133.46.252
Jan 4, 2025 13:07:50.634185076 CET803846479.133.46.252192.168.2.15
Jan 4, 2025 13:08:11.308818102 CET803846479.133.46.252192.168.2.15
Jan 4, 2025 13:08:11.310965061 CET3846480192.168.2.1579.133.46.252
Jan 4, 2025 13:08:11.450875044 CET3846480192.168.2.1579.133.46.252
Jan 4, 2025 13:08:11.455694914 CET803846479.133.46.252192.168.2.15
Session IDSource IPSource PortDestination IPDestination Port
0192.168.2.153846479.133.46.25280
TimestampBytes transferredDirectionData
Jan 4, 2025 13:07:50.629430056 CET46OUTGET /hiddenbin/Space.arm6 HTTP/1.
Data Raw:
Data Ascii:


System Behavior

Start time (UTC):12:07:42
Start date (UTC):04/01/2025
Path:/usr/bin/dash
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):12:07:42
Start date (UTC):04/01/2025
Path:/usr/bin/rm
Arguments:rm -f /tmp/tmp.b8AVVSacLJ /tmp/tmp.ycEs7ZfI5d /tmp/tmp.jFMq66eJaI
File size:72056 bytes
MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

Start time (UTC):12:07:42
Start date (UTC):04/01/2025
Path:/usr/bin/dash
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):12:07:42
Start date (UTC):04/01/2025
Path:/usr/bin/rm
Arguments:rm -f /tmp/tmp.b8AVVSacLJ /tmp/tmp.ycEs7ZfI5d /tmp/tmp.jFMq66eJaI
File size:72056 bytes
MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

Start time (UTC):12:07:49
Start date (UTC):04/01/2025
Path:/tmp/Space.arm6.elf
Arguments:/tmp/Space.arm6.elf
File size:4956856 bytes
MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1