Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
x864433.elf

Overview

General Information

Sample name:x864433.elf
Analysis ID:1586621
MD5:1910f33ae648a237376a60c76f2bd61a
SHA1:8646c9862404a1d6090e9e883b9f6f2c53674d22
SHA256:198a0922f19f098abb5800a89f581aab8021e74d7b824156a3027b7f3c0e7048
Tags:BackdoorelfGetshellmalwaretrojanuser-Joker
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1586621
Start date and time:2025-01-09 12:35:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 18s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x864433.elf
Detection:MAL
Classification:mal68.linELF@0/0@0/0
Command:/tmp/x864433.elf
PID:6219
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • x864433.elf (PID: 6219, Parent: 6135, MD5: 1910f33ae648a237376a60c76f2bd61a) Arguments: /tmp/x864433.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
x864433.elfLinux_Trojan_Getshell_98d002bfunknownunknown
  • 0xb7:$a: B2 6A B0 03 CD 80 85 C0 78 02 FF E1 B8 01 00 00 00 BB 01 00
SourceRuleDescriptionAuthorStrings
6219.1.0000000008048000.0000000008049000.rwx.sdmpLinux_Trojan_Getshell_98d002bfunknownunknown
  • 0xb7:$a: B2 6A B0 03 CD 80 85 C0 78 02 FF E1 B8 01 00 00 00 BB 01 00
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x864433.elfAvira: detected
Source: x864433.elfVirustotal: Detection: 51%Perma Link
Source: x864433.elfReversingLabs: Detection: 63%
Source: x864433.elfJoe Sandbox ML: detected
Source: global trafficTCP traffic: 192.168.2.23:51568 -> 45.43.36.223:4433
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: x864433.elf, type: SAMPLEMatched rule: Linux_Trojan_Getshell_98d002bf Author: unknown
Source: 6219.1.0000000008048000.0000000008049000.rwx.sdmp, type: MEMORYMatched rule: Linux_Trojan_Getshell_98d002bf Author: unknown
Source: LOAD without section mappingsProgram segment: 0x8048000
Source: x864433.elf, type: SAMPLEMatched rule: Linux_Trojan_Getshell_98d002bf reference_sample = 97b7650ab083f7ba23417e6d5d9c1d133b9158e2c10427d1f1e50dfe6c0e7541, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Getshell, fingerprint = b7bfec0a3cfc05b87fefac6b10673491b611400edacf9519cbcc1a71842e9fa3, id = 98d002bf-63b7-4d11-98ef-c3127e68d59c, last_modified = 2021-09-16
Source: 6219.1.0000000008048000.0000000008049000.rwx.sdmp, type: MEMORYMatched rule: Linux_Trojan_Getshell_98d002bf reference_sample = 97b7650ab083f7ba23417e6d5d9c1d133b9158e2c10427d1f1e50dfe6c0e7541, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Getshell, fingerprint = b7bfec0a3cfc05b87fefac6b10673491b611400edacf9519cbcc1a71842e9fa3, id = 98d002bf-63b7-4d11-98ef-c3127e68d59c, last_modified = 2021-09-16
Source: classification engineClassification label: mal68.linELF@0/0@0/0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
x864433.elf52%VirustotalBrowse
x864433.elf63%ReversingLabsLinux.Backdoor.GetShell
x864433.elf100%AviraLINUX/Getshell.AR
x864433.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
45.43.36.223
unknownUnited States
135377UHGL-AS-APUCloudHKHoldingsGroupLimitedHKfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
45.43.36.22345678.elfGet hashmaliciousUnknownBrowse
    aarch643308.elfGet hashmaliciousUnknownBrowse
      mipsle44555.elfGet hashmaliciousUnknownBrowse
        3344.exeGet hashmaliciousMetasploitBrowse
          m.elfGet hashmaliciousUnknownBrowse
            5544x64.elfGet hashmaliciousConnectBackBrowse
              shell64.elfGet hashmaliciousConnectBackBrowse
                91.189.91.43sst.elfGet hashmaliciousGafgytBrowse
                  ssx.elfGet hashmaliciousGafgytBrowse
                    sss.elfGet hashmaliciousGafgytBrowse
                      12.elfGet hashmaliciousUnknownBrowse
                        Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                          2.elfGet hashmaliciousUnknownBrowse
                            main_ppc.elfGet hashmaliciousMiraiBrowse
                              a-r.m-5.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                ssl.elfGet hashmaliciousGafgytBrowse
                                  ssx.elfGet hashmaliciousGafgytBrowse
                                    91.189.91.42sst.elfGet hashmaliciousGafgytBrowse
                                      ssx.elfGet hashmaliciousGafgytBrowse
                                        sss.elfGet hashmaliciousGafgytBrowse
                                          12.elfGet hashmaliciousUnknownBrowse
                                            Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                                              2.elfGet hashmaliciousUnknownBrowse
                                                main_ppc.elfGet hashmaliciousMiraiBrowse
                                                  a-r.m-5.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                    ssl.elfGet hashmaliciousGafgytBrowse
                                                      ssx.elfGet hashmaliciousGafgytBrowse
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CANONICAL-ASGBsst.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        ssx.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        sss.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        12.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        2.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        main_ppc.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        a-r.m-5.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 91.189.91.42
                                                        ssl.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        ssx.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        CANONICAL-ASGBsst.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        ssx.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        sss.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        12.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        2.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        main_ppc.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        a-r.m-5.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 91.189.91.42
                                                        ssl.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        ssx.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        INIT7CHsst.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        ssx.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        sss.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        12.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        2.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        main_ppc.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        a-r.m-5.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 109.202.202.202
                                                        ssl.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        ssx.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        UHGL-AS-APUCloudHKHoldingsGroupLimitedHK45678.elfGet hashmaliciousUnknownBrowse
                                                        • 45.43.36.223
                                                        aarch643308.elfGet hashmaliciousUnknownBrowse
                                                        • 45.43.36.223
                                                        mipsle44555.elfGet hashmaliciousUnknownBrowse
                                                        • 45.43.36.223
                                                        Mmt4YaKg5u.exeGet hashmaliciousUnknownBrowse
                                                        • 107.150.123.235
                                                        3344.exeGet hashmaliciousMetasploitBrowse
                                                        • 45.43.36.223
                                                        m.elfGet hashmaliciousUnknownBrowse
                                                        • 45.43.36.223
                                                        5544x64.elfGet hashmaliciousConnectBackBrowse
                                                        • 45.43.36.223
                                                        rebirth.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 128.1.49.123
                                                        ORDER-401.exeGet hashmaliciousFormBookBrowse
                                                        • 107.155.56.30
                                                        MAERSK LINE SHIPPING DOC_4253.exeGet hashmaliciousFormBookBrowse
                                                        • 107.155.56.30
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, no section header
                                                        Entropy (8bit):4.713199391174593
                                                        TrID:
                                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                        File name:x864433.elf
                                                        File size:207 bytes
                                                        MD5:1910f33ae648a237376a60c76f2bd61a
                                                        SHA1:8646c9862404a1d6090e9e883b9f6f2c53674d22
                                                        SHA256:198a0922f19f098abb5800a89f581aab8021e74d7b824156a3027b7f3c0e7048
                                                        SHA512:95ac879d51c360a8410f64f6713ff56e2b6f208eea8ffe2426bc1bd904f6f97d065eef08ca11a38580041c8b1a65cfd408b701e3b3b355b8438ec7f8cd964973
                                                        SSDEEP:3:Bkkk/tMlwXll/O/slrCs4X1lFrSwfOHuuIM8IPNioOHyUvwGcVt6fE2:Btk/tMl//E2s4COuIKQXSEwhVYfE2
                                                        TLSH:8BD08041C1529143C07CDA3975146F5F1724C22B81501F6623D56BC8CCEA9540E31F14
                                                        File Content Preview:.ELF....................T...4...........4. .............................J...........j.^1...SCSj..f.....[h-+$.h...Q..jfXPQW..C....y.Nt=h....Xj.j...1.....y..'................}....x.[....j......x...............

                                                        ELF header

                                                        Class:ELF32
                                                        Data:2's complement, little endian
                                                        Version:1 (current)
                                                        Machine:Intel 80386
                                                        Version Number:0x1
                                                        Type:EXEC (Executable file)
                                                        OS/ABI:UNIX - System V
                                                        ABI Version:0
                                                        Entry Point Address:0x8048054
                                                        Flags:0x0
                                                        ELF Header Size:52
                                                        Program Header Offset:52
                                                        Program Header Size:32
                                                        Number of Program Headers:1
                                                        Section Header Offset:0
                                                        Section Header Size:0
                                                        Number of Section Headers:0
                                                        Header String Table Index:0
                                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                        LOAD0x00x80480000x80480000xcf0x14a4.71320x7RWE0x1000
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 9, 2025 12:35:41.487978935 CET515684433192.168.2.2345.43.36.223
                                                        Jan 9, 2025 12:35:41.492906094 CET44335156845.43.36.223192.168.2.23
                                                        Jan 9, 2025 12:35:41.492960930 CET515684433192.168.2.2345.43.36.223
                                                        Jan 9, 2025 12:35:43.514578104 CET44335156845.43.36.223192.168.2.23
                                                        Jan 9, 2025 12:35:43.516220093 CET515684433192.168.2.2345.43.36.223
                                                        Jan 9, 2025 12:35:43.675309896 CET515684433192.168.2.2345.43.36.223
                                                        Jan 9, 2025 12:35:43.680170059 CET44335156845.43.36.223192.168.2.23
                                                        Jan 9, 2025 12:35:43.968158960 CET43928443192.168.2.2391.189.91.42
                                                        Jan 9, 2025 12:35:49.343563080 CET42836443192.168.2.2391.189.91.43
                                                        Jan 9, 2025 12:35:50.879338980 CET4251680192.168.2.23109.202.202.202
                                                        Jan 9, 2025 12:36:05.213289022 CET43928443192.168.2.2391.189.91.42
                                                        Jan 9, 2025 12:36:15.451919079 CET42836443192.168.2.2391.189.91.43
                                                        Jan 9, 2025 12:36:21.595067978 CET4251680192.168.2.23109.202.202.202
                                                        Jan 9, 2025 12:36:46.167846918 CET43928443192.168.2.2391.189.91.42
                                                        Jan 9, 2025 12:37:06.644985914 CET42836443192.168.2.2391.189.91.43

                                                        System Behavior

                                                        Start time (UTC):11:35:40
                                                        Start date (UTC):09/01/2025
                                                        Path:/tmp/x864433.elf
                                                        Arguments:/tmp/x864433.elf
                                                        File size:207 bytes
                                                        MD5 hash:1910f33ae648a237376a60c76f2bd61a