Edit tour
Linux
Analysis Report
watchdog.elf
Overview
General Information
Sample name: | watchdog.elf |
Analysis ID: | 1586448 |
MD5: | f124e8a9e771966e3846a638be333e8d |
SHA1: | 07a3ee5d11f8c31f650de519edaa18a4c7548a9d |
SHA256: | 50dad45e91f61043118a822c13316171108c676db874ab5cfc77f149a41eba9f |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Xmrig
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Detected Stratum mining protocol
Executes the "crontab" command typically for achieving persistence
Sample deletes itself
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to persist itself using cron
Tries to load the MSR kernel module used for reading/writing to CPUs model specific register
Uses known network protocols on non-standard ports
Writes ELF files to hidden directories
Writes identical ELF files to multiple locations
Writes to CPU model specific registers (MSR) (e.g. miners improve performance by disabling HW prefetcher)
Contains symbols related to standard C library sleeps (sometimes used to evade sandboxing)
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Executes commands using a shell command-line interpreter
Executes the "grep" command used to find patterns in files or piped streams
Executes the "modprobe" command used for loading kernel modules
Reads CPU information from /proc indicative of miner or evasive malware
Reads CPU information from /sys indicative of miner or evasive malware
Reads system information from the proc file system
Reads the 'hosts' file potentially containing internal network hosts
Sample and/or dropped files contains symbols with suspicious names
Sample has stripped symbol table
Sample listens on a socket
Sample tries to set the executable flag
Suricata IDS alerts with low severity for network traffic
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk
Yara signature match
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1586448 |
Start date and time: | 2025-01-09 07:07:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 12m 29s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | watchdog.elf |
Detection: | MAL |
Classification: | mal100.troj.evad.mine.linELF@0/96@4/0 |
Cookbook Comments: |
|
- Max analysis timeout: 600s exceeded, the analysis took too long
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: http://1.1.1.1:8080/
- VT rate limit hit for: http://162.240.239.103:8000/
- VT rate limit hit for: http://191.252.194.180:8000/
- VT rate limit hit for: http://67.205.135.145:8000/
- VT rate limit hit for: http://91.227.18.60:8000/
- VT rate limit hit for: http://HTTP/1.0Connection
Command: | /tmp/watchdog.elf |
PID: | 5514 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | starting server removing cronjob deleting self stopping server |
Standard Error: | no crontab for root |
- system is lnxubuntu20
- watchdog.elf New Fork (PID: 5515, Parent: 5514)
- watchdog.elf New Fork (PID: 5529, Parent: 5514)
- watchdog.elf New Fork (PID: 5530, Parent: 5529)
- HIsZygoZ2jW0Q New Fork (PID: 5963, Parent: 5529)
- watchdog.elf New Fork (PID: 5543, Parent: 5514)
- watchdog.elf New Fork (PID: 5545, Parent: 5543)
- 3JlaqAbw New Fork (PID: 5556, Parent: 5543)
- v7JYhylR New Fork (PID: 5585, Parent: 5572)
- 3IjY1dOX New Fork (PID: 5618, Parent: 5605)
- FfvI9TNe New Fork (PID: 5645, Parent: 5632)
- 1ay0mCs9 New Fork (PID: 5674, Parent: 5661)
- eBc7g8EI New Fork (PID: 5701, Parent: 5688)
- 5MRubITn New Fork (PID: 5729, Parent: 5715)
- oZtriZN1 New Fork (PID: 5758, Parent: 5743)
- HxJw69zN New Fork (PID: 5785, Parent: 5772)
- T3B6PyyF New Fork (PID: 5812, Parent: 5799)
- Osk130te New Fork (PID: 5839, Parent: 5826)
- mwxK5CRX New Fork (PID: 5868, Parent: 5855)
- r9nyGbJf New Fork (PID: 5914, Parent: 5903)
- Ppo5qPwq New Fork (PID: 5941, Parent: 5932)
- os83CR7k New Fork (PID: 5979, Parent: 5969)
- qXgzqvkC New Fork (PID: 6011, Parent: 5998)
- EAELj4z6 New Fork (PID: 6040, Parent: 6027)
- yTqqXMpV New Fork (PID: 6067, Parent: 6054)
- yTqqXMpV New Fork (PID: 6081, Parent: 6054)
- yTqqXMpV New Fork (PID: 6082, Parent: 6054)
- yTqqXMpV New Fork (PID: 6090, Parent: 6054)
- EAELj4z6 New Fork (PID: 6055, Parent: 6027)
- sh New Fork (PID: 6057, Parent: 6055)
- sh New Fork (PID: 6058, Parent: 6055)
- sh New Fork (PID: 6059, Parent: 6055)
- EAELj4z6 New Fork (PID: 6063, Parent: 6027)
- qXgzqvkC New Fork (PID: 6028, Parent: 5998)
- sh New Fork (PID: 6030, Parent: 6028)
- sh New Fork (PID: 6031, Parent: 6028)
- sh New Fork (PID: 6032, Parent: 6028)
- qXgzqvkC New Fork (PID: 6036, Parent: 5998)
- os83CR7k New Fork (PID: 5999, Parent: 5969)
- sh New Fork (PID: 6001, Parent: 5999)
- sh New Fork (PID: 6002, Parent: 5999)
- sh New Fork (PID: 6003, Parent: 5999)
- os83CR7k New Fork (PID: 6007, Parent: 5969)
- Ppo5qPwq New Fork (PID: 5970, Parent: 5932)
- sh New Fork (PID: 5972, Parent: 5970)
- sh New Fork (PID: 5973, Parent: 5970)
- sh New Fork (PID: 5974, Parent: 5970)
- Ppo5qPwq New Fork (PID: 5978, Parent: 5932)
- r9nyGbJf New Fork (PID: 5933, Parent: 5903)
- sh New Fork (PID: 5938, Parent: 5933)
- sh New Fork (PID: 5939, Parent: 5933)
- sh New Fork (PID: 5940, Parent: 5933)
- r9nyGbJf New Fork (PID: 5942, Parent: 5903)
- sh New Fork (PID: 5947, Parent: 5942)
- sh New Fork (PID: 5948, Parent: 5942)
- sh New Fork (PID: 5949, Parent: 5942)
- r9nyGbJf New Fork (PID: 5950, Parent: 5903)
- mwxK5CRX New Fork (PID: 5904, Parent: 5855)
- sh New Fork (PID: 5906, Parent: 5904)
- sh New Fork (PID: 5907, Parent: 5904)
- sh New Fork (PID: 5908, Parent: 5904)
- mwxK5CRX New Fork (PID: 5912, Parent: 5855)
- Osk130te New Fork (PID: 5856, Parent: 5826)
- sh New Fork (PID: 5858, Parent: 5856)
- sh New Fork (PID: 5859, Parent: 5856)
- sh New Fork (PID: 5860, Parent: 5856)
- Osk130te New Fork (PID: 5864, Parent: 5826)
- T3B6PyyF New Fork (PID: 5827, Parent: 5799)
- sh New Fork (PID: 5829, Parent: 5827)
- sh New Fork (PID: 5830, Parent: 5827)
- sh New Fork (PID: 5831, Parent: 5827)
- T3B6PyyF New Fork (PID: 5835, Parent: 5799)
- HxJw69zN New Fork (PID: 5800, Parent: 5772)
- sh New Fork (PID: 5802, Parent: 5800)
- sh New Fork (PID: 5803, Parent: 5800)
- sh New Fork (PID: 5804, Parent: 5800)
- HxJw69zN New Fork (PID: 5808, Parent: 5772)
- oZtriZN1 New Fork (PID: 5773, Parent: 5743)
- sh New Fork (PID: 5775, Parent: 5773)
- sh New Fork (PID: 5776, Parent: 5773)
- sh New Fork (PID: 5777, Parent: 5773)
- oZtriZN1 New Fork (PID: 5781, Parent: 5743)
- 5MRubITn New Fork (PID: 5744, Parent: 5715)
- sh New Fork (PID: 5746, Parent: 5744)
- sh New Fork (PID: 5747, Parent: 5744)
- sh New Fork (PID: 5748, Parent: 5744)
- 5MRubITn New Fork (PID: 5754, Parent: 5715)
- eBc7g8EI New Fork (PID: 5716, Parent: 5688)
- sh New Fork (PID: 5718, Parent: 5716)
- sh New Fork (PID: 5719, Parent: 5716)
- sh New Fork (PID: 5720, Parent: 5716)
- eBc7g8EI New Fork (PID: 5724, Parent: 5688)
- 1ay0mCs9 New Fork (PID: 5689, Parent: 5661)
- sh New Fork (PID: 5691, Parent: 5689)
- sh New Fork (PID: 5692, Parent: 5689)
- sh New Fork (PID: 5693, Parent: 5689)
- 1ay0mCs9 New Fork (PID: 5697, Parent: 5661)
- FfvI9TNe New Fork (PID: 5662, Parent: 5632)
- sh New Fork (PID: 5664, Parent: 5662)
- sh New Fork (PID: 5665, Parent: 5662)
- sh New Fork (PID: 5666, Parent: 5662)
- FfvI9TNe New Fork (PID: 5670, Parent: 5632)
- 3IjY1dOX New Fork (PID: 5633, Parent: 5605)
- sh New Fork (PID: 5635, Parent: 5633)
- sh New Fork (PID: 5636, Parent: 5633)
- sh New Fork (PID: 5637, Parent: 5633)
- 3IjY1dOX New Fork (PID: 5641, Parent: 5605)
- v7JYhylR New Fork (PID: 5606, Parent: 5572)
- sh New Fork (PID: 5608, Parent: 5606)
- sh New Fork (PID: 5609, Parent: 5606)
- sh New Fork (PID: 5610, Parent: 5606)
- v7JYhylR New Fork (PID: 5614, Parent: 5572)
- 3JlaqAbw New Fork (PID: 5573, Parent: 5543)
- sh New Fork (PID: 5575, Parent: 5573)
- sh New Fork (PID: 5576, Parent: 5573)
- sh New Fork (PID: 5577, Parent: 5573)
- 3JlaqAbw New Fork (PID: 5581, Parent: 5543)
- watchdog.elf New Fork (PID: 5544, Parent: 5514)
- sh New Fork (PID: 5546, Parent: 5544)
- sh New Fork (PID: 5547, Parent: 5544)
- sh New Fork (PID: 5548, Parent: 5544)
- watchdog.elf New Fork (PID: 5552, Parent: 5514)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XMRIG | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Pornoasset_927f314f | unknown | unknown |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-09T07:15:36.529345+0100 | 2826930 | 2 | Crypto Currency Mining Activity Detected | 192.168.2.14 | 40106 | 88.198.117.174 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Bitcoin Miner |
---|
Source: | File source: |
Source: | TCP traffic: |