Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1616152
MD5:4fd9e1b2c17ea4d724c314d710feef8f
SHA1:f6b7e05726e5dbc54e9cf519510ec99468dac12b
SHA256:589af997bc712558f6c7081f8f8a452d4ce6d3318d238e6591205884bbd561ca
Tags:elfuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Performs DNS TXT record lookups
Sample reads /proc/mounts (often used for finding a writable filesystem)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1616152
Start date and time:2025-02-16 02:07:21 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal64.troj.evad.linELF@0/0@3/0
  • VT rate limit hit for: lib.libre
Command:/tmp/na.elf
PID:5489
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5489, Parent: 5413, MD5: 4fd9e1b2c17ea4d724c314d710feef8f) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5490, Parent: 5489)
    • na.elf New Fork (PID: 5491, Parent: 5489)
    • na.elf New Fork (PID: 5505, Parent: 5489)
  • cleanup
SourceRuleDescriptionAuthorStrings
na.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xb11c:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
na.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xb90b:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
na.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x7c4a:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x7dac:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
na.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xdefa:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
na.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xb4cb:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 2 entries
SourceRuleDescriptionAuthorStrings
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xb11c:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xb90b:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x7c4a:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x7dac:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xdefa:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xb4cb:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 2 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfReversingLabs: Detection: 21%
Source: global trafficTCP traffic: 192.168.2.14:45546 -> 64.23.188.144:28256
Source: global trafficUDP traffic: 192.168.2.14:55746 -> 74.125.250.129:19302
Source: /tmp/na.elf (PID: 5489)Socket: 127.0.0.1:43478Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownUDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknownUDP traffic detected without corresponding DNS query: 74.125.250.129
Source: global trafficDNS traffic detected: DNS query: lib.libre
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/na.elf (PID: 5490)SIGKILL sent: pid: 14808, result: successfulJump to behavior
Source: /tmp/na.elf (PID: 5490)SIGKILL sent: pid: 18055, result: successfulJump to behavior
Source: /tmp/na.elf (PID: 5490)SIGKILL sent: pid: 18175, result: successfulJump to behavior
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
Source: classification engineClassification label: mal64.troj.evad.linELF@0/0@3/0

Persistence and Installation Behavior

barindex
Source: /tmp/na.elf (PID: 5490)File: /proc/5490/mountsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3244/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3244/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3244/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3120/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3120/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3120/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3361/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3361/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3361/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3239/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3239/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3239/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1577/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1577/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1610/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1610/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1610/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1299/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1299/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1299/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3235/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3235/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3235/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2946/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2946/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2946/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/917/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/917/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3134/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3134/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1593/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1593/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3011/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3011/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3011/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3094/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3094/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2955/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2955/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2955/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3406/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3406/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1589/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1589/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3129/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3129/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3129/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1588/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1588/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3402/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3402/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3125/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3125/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3125/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3246/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3246/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3245/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3245/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3245/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/767/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/767/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/800/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/800/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/888/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/888/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/888/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/801/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/801/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/769/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/769/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/769/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/803/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/803/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/806/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/806/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/807/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/807/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/928/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/928/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2956/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2956/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/2956/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3420/mapsJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3420/statusJump to behavior
Source: /tmp/na.elf (PID: 5490)File opened: /proc/3420/cmdlineJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: TrafficDNS traffic detected: queries for: lib.libre
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
1
File and Directory Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1616152 Sample: na.elf Startdate: 16/02/2025 Architecture: LINUX Score: 64 16 lib.libre 2->16 18 74.125.250.129, 19302, 55746 GOOGLEUS United States 2->18 20 2 other IPs or domains 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 7 na.elf 2->7         started        signatures3 26 Performs DNS TXT record lookups 16->26 process4 process5 9 na.elf 7->9         started        12 na.elf 7->12         started        14 na.elf 7->14         started        signatures6 28 Sample reads /proc/mounts (often used for finding a writable filesystem) 9->28

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
na.elf22%ReversingLabsLinux.Backdoor.Gafgyt
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    lib.libre
    unknown
    unknowntrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      64.23.188.144
      unknownUnited States
      3064AFFINITY-FTLUSfalse
      74.125.250.129
      unknownUnited States
      15169GOOGLEUSfalse
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      daisy.ubuntu.comna.elfGet hashmaliciousUnknownBrowse
      • 162.213.35.25
      res.arm7.elfGet hashmaliciousUnknownBrowse
      • 162.213.35.24
      sora.x86_64.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.24
      sora.ppc.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.24
      sora.sh4.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      sora.arm6.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.24
      sora.m68k.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      sora.arm7.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.24
      sora.x86.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      AFFINITY-FTLUSarm7.elfGet hashmaliciousMirai, MoobotBrowse
      • 207.36.98.138
      arm7.elfGet hashmaliciousMirai, MoobotBrowse
      • 64.159.94.16
      https://gffd-5ru.pages.dev/?email=nobody@wp.pl&mail=wp.plGet hashmaliciousHTMLPhisherBrowse
      • 66.113.135.6
      sh4.elfGet hashmaliciousMirai, MoobotBrowse
      • 66.232.157.134
      telnet.x86.elfGet hashmaliciousUnknownBrowse
      • 216.219.155.110
      powerpc.elfGet hashmaliciousUnknownBrowse
      • 207.234.192.3
      3.elfGet hashmaliciousUnknownBrowse
      • 64.157.90.120
      https://eldivan.mx/?data=c2dlcmplc0BmaXJzdGFyLWJhbmsuY29tGet hashmaliciousHTMLPhisherBrowse
      • 64.23.136.73
      armv4l.elfGet hashmaliciousUnknownBrowse
      • 64.23.59.243
      loligang.spc.elfGet hashmaliciousMiraiBrowse
      • 64.23.154.157
      No context
      No context
      No created / dropped files found
      File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
      Entropy (8bit):6.23841943586097
      TrID:
      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
      File name:na.elf
      File size:71'712 bytes
      MD5:4fd9e1b2c17ea4d724c314d710feef8f
      SHA1:f6b7e05726e5dbc54e9cf519510ec99468dac12b
      SHA256:589af997bc712558f6c7081f8f8a452d4ce6d3318d238e6591205884bbd561ca
      SHA512:4bfcbabca7330ed80b1664f06ab2a2e37273d73067394fb1200048a68a70115ab0d22ed4381fa7509d71cc195413f7e887511ef19be75caaedee54383eb05c7b
      SSDEEP:1536:v3tMS2odfYmUf0565um3xTZPQ7w+4IK2MSfj6ueO6/ok8h1:v3O/sfYmUfxxxT5l/IK2P6uugk8h1
      TLSH:52636D176580C0FFC499D2744B6EA61BE533B47D2238F25D2BD9EF2B6E5AD202F5A100
      File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@.....P.......P.................................Q.......Q.....`........o..............Q.td....................................................H...._....J...H........

      ELF header

      Class:ELF64
      Data:2's complement, little endian
      Version:1 (current)
      Machine:Advanced Micro Devices X86-64
      Version Number:0x1
      Type:EXEC (Executable file)
      OS/ABI:UNIX - System V
      ABI Version:0
      Entry Point Address:0x400194
      Flags:0x0
      ELF Header Size:64
      Program Header Offset:64
      Program Header Size:56
      Number of Program Headers:3
      Section Header Offset:71072
      Section Header Size:64
      Number of Section Headers:10
      Header String Table Index:9
      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
      NULL0x00x00x00x00x0000
      .initPROGBITS0x4000e80xe80x130x00x6AX001
      .textPROGBITS0x4001000x1000xe2760x00x6AX0016
      .finiPROGBITS0x40e3760xe3760xe0x00x6AX001
      .rodataPROGBITS0x40e3a00xe3a00x27b00x00x2A0032
      .ctorsPROGBITS0x5110000x110000x100x00x3WA008
      .dtorsPROGBITS0x5110100x110100x100x00x3WA008
      .dataPROGBITS0x5110400x110400x5200x00x3WA0032
      .bssNOBITS0x5115600x115600x6a880x00x3WA0032
      .shstrtabSTRTAB0x00x115600x3e0x00x0001
      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      LOAD0x00x4000000x4000000x10b500x10b506.38390x5R E0x100000.init .text .fini .rodata
      LOAD0x110000x5110000x5110000x5600x6fe82.35800x6RW 0x100000.ctors .dtors .data .bss
      GNU_STACK0x00x00x00x00x00.00000x6RW 0x8

      Download Network PCAP: filteredfull

      • Total Packets: 40
      • 28256 undefined
      • 19302 undefined
      • 53 (DNS)
      TimestampSource PortDest PortSource IPDest IP
      Feb 16, 2025 02:08:05.606380939 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:05.611237049 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:05.611306906 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:06.189980984 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:06.190031052 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:06.282358885 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:06.282411098 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:11.671116114 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:11.752928019 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:20.470040083 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:20.470164061 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:30.479494095 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:30.484575987 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:30.484628916 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:30.489458084 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:43.111048937 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:43.116262913 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:43.116317987 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:43.121223927 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:55.770714998 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:55.778285027 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:08:55.778347969 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:08:55.786566019 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:10.686070919 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:10.691162109 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:10.691231966 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:10.696314096 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:24.441692114 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:24.447067022 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:24.447149038 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:24.452346087 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:37.721426010 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:37.726717949 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:37.726803064 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:37.731868029 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:49.489157915 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:49.489514112 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:59.498960972 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:59.505796909 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:09:59.505872965 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:09:59.510736942 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:10:14.027992964 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:10:14.036489964 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:10:14.036596060 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:10:14.044668913 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:10:28.059427023 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:10:28.065254927 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:10:28.065622091 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:10:28.070765018 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:10:43.070723057 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:10:43.076069117 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:10:43.076189995 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:10:43.081438065 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:10:58.070138931 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:10:58.074968100 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:10:58.075051069 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:10:58.079847097 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:11:13.077615023 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:11:13.082693100 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:11:13.082778931 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:11:13.087812901 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:11:14.509160995 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:11:14.509289026 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:11:25.769176960 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:11:25.774789095 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:11:25.774897099 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:11:25.780428886 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:11:38.992733002 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:11:38.997706890 CET282564554664.23.188.144192.168.2.14
      Feb 16, 2025 02:11:38.997814894 CET4554628256192.168.2.1464.23.188.144
      Feb 16, 2025 02:11:39.002711058 CET282564554664.23.188.144192.168.2.14
      TimestampSource PortDest PortSource IPDest IP
      Feb 16, 2025 02:08:05.592792988 CET5605153192.168.2.14116.203.104.203
      Feb 16, 2025 02:08:05.604553938 CET5356051116.203.104.203192.168.2.14
      Feb 16, 2025 02:08:06.617572069 CET5574619302192.168.2.1474.125.250.129
      Feb 16, 2025 02:08:07.088377953 CET193025574674.125.250.129192.168.2.14
      Feb 16, 2025 02:10:50.876909971 CET3808353192.168.2.148.8.8.8
      Feb 16, 2025 02:10:50.877023935 CET3594153192.168.2.148.8.8.8
      Feb 16, 2025 02:10:50.883546114 CET53380838.8.8.8192.168.2.14
      Feb 16, 2025 02:10:50.884114981 CET53359418.8.8.8192.168.2.14
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Feb 16, 2025 02:08:05.592792988 CET192.168.2.14116.203.104.2030x48ddStandard query (0)lib.libre16IN (0x0001)false
      Feb 16, 2025 02:10:50.876909971 CET192.168.2.148.8.8.80xd4fcStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
      Feb 16, 2025 02:10:50.877023935 CET192.168.2.148.8.8.80x138bStandard query (0)daisy.ubuntu.com28IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Feb 16, 2025 02:08:05.604553938 CET116.203.104.203192.168.2.140x48ddNo error (0)lib.libreTXT (Text strings)IN (0x0001)false
      Feb 16, 2025 02:10:50.883546114 CET8.8.8.8192.168.2.140xd4fcNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
      Feb 16, 2025 02:10:50.883546114 CET8.8.8.8192.168.2.140xd4fcNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

      System Behavior

      Start time (UTC):01:08:04
      Start date (UTC):16/02/2025
      Path:/tmp/na.elf
      Arguments:/tmp/na.elf
      File size:71712 bytes
      MD5 hash:4fd9e1b2c17ea4d724c314d710feef8f

      Start time (UTC):01:08:04
      Start date (UTC):16/02/2025
      Path:/tmp/na.elf
      Arguments:-
      File size:71712 bytes
      MD5 hash:4fd9e1b2c17ea4d724c314d710feef8f

      Start time (UTC):01:08:04
      Start date (UTC):16/02/2025
      Path:/tmp/na.elf
      Arguments:-
      File size:71712 bytes
      MD5 hash:4fd9e1b2c17ea4d724c314d710feef8f

      Start time (UTC):01:08:04
      Start date (UTC):16/02/2025
      Path:/tmp/na.elf
      Arguments:-
      File size:71712 bytes
      MD5 hash:4fd9e1b2c17ea4d724c314d710feef8f