Edit tour

Linux Analysis Report
.i.elf

Overview

General Information

Sample name:.i.elf
Analysis ID:1643522
MD5:4745172a493b29e40a173b0f7673f04f
SHA1:aeb5a1332a22777a9f77b17fa19e18cbb1161835
SHA256:3d23ebeb41ecd3137ad96970b2b6c9d75c71e888dcd5f4162817f8567a772ff3
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1643522
Start date and time:2025-03-19 22:32:14 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:.i.elf
Detection:MAL
Classification:mal48.linELF@0/0@2/0
Command:/tmp/.i.elf
PID:5425
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • .i.elf (PID: 5425, Parent: 5349, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/.i.elf
  • dash New Fork (PID: 5494, Parent: 3585)
  • rm (PID: 5494, Parent: 3585, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.0bzZ8ZV7xA /tmp/tmp.Z0OiFHaKuZ /tmp/tmp.u2nKULVaDT
  • dash New Fork (PID: 5495, Parent: 3585)
  • rm (PID: 5495, Parent: 3585, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.0bzZ8ZV7xA /tmp/tmp.Z0OiFHaKuZ /tmp/tmp.u2nKULVaDT
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: .i.elfVirustotal: Detection: 43%Perma Link
Source: .i.elfReversingLabs: Detection: 55%
Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54632
Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 54632 -> 443
Source: LOAD without section mappingsProgram segment: 0x10000
Source: classification engineClassification label: mal48.linELF@0/0@2/0
Source: /usr/bin/dash (PID: 5494)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.0bzZ8ZV7xA /tmp/tmp.Z0OiFHaKuZ /tmp/tmp.u2nKULVaDTJump to behavior
Source: /usr/bin/dash (PID: 5495)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.0bzZ8ZV7xA /tmp/tmp.Z0OiFHaKuZ /tmp/tmp.u2nKULVaDTJump to behavior
Source: .i.elfSubmission file: segment LOAD with 7.9966 entropy (max. 8.0)
Source: /tmp/.i.elf (PID: 5425)Queries kernel information via 'uname': Jump to behavior
Source: .i.elf, 5425.1.00005571f1091000.00005571f11bf000.rw-.sdmpBinary or memory string: qU!/etc/qemu-binfmt/arm
Source: .i.elf, 5425.1.00007fff3ced1000.00007fff3cef2000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/.i.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/.i.elf
Source: .i.elf, 5425.1.00005571f1091000.00005571f11bf000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: .i.elf, 5425.1.00007fff3ced1000.00007fff3cef2000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: .i.elf, 5425.1.00007fff3ced1000.00007fff3cef2000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Obfuscated Files or Information
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1643522 Sample: .i.elf Startdate: 19/03/2025 Architecture: LINUX Score: 48 12 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->12 14 34.254.182.186, 443, 54632 AMAZON-02US United States 2->14 16 daisy.ubuntu.com 2->16 18 Multi AV Scanner detection for submitted file 2->18 6 dash rm 2->6         started        8 dash rm 2->8         started        10 .i.elf 2->10         started        signatures3 process4
SourceDetectionScannerLabelLink
.i.elf44%VirustotalBrowse
.i.elf56%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    34.254.182.186
    unknownUnited States
    16509AMAZON-02USfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26jkse.arm6.elfGet hashmaliciousUnknownBrowse
      nklarm6.elfGet hashmaliciousUnknownBrowse
        na.elfGet hashmaliciousPrometeiBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              sync.mipsel.elfGet hashmaliciousUnknownBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  arm6.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      Federalx86Agent.elfGet hashmaliciousMiraiBrowse
                        34.254.182.186x-8.6-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                          8893Xmi39S.arm5.elfGet hashmaliciousUnknownBrowse
                            sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                hidakibest.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  main_arm7.elfGet hashmaliciousMiraiBrowse
                                    na.elfGet hashmaliciousPrometeiBrowse
                                      na.elfGet hashmaliciousPrometeiBrowse
                                        rebirth.ppc.elfGet hashmaliciousGafgytBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            daisy.ubuntu.comi.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            i.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            jkse.arm7.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            jkse.ppc.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            jkse.arm6.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            jkse.arm.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            jkse.x86.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            nklarm6.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            zerarm6.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            jklarm6.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                            • 52.212.150.54
                                            sshd.elfGet hashmaliciousUnknownBrowse
                                            • 34.249.145.219
                                            https://polestubllin.ac-page.com/documents-nowreview-copy?test=true&data=05%7C02%7Cdeborah.cantu@christushealth.org%7C9e7f5b22750f4b0a926208dd67155304%7C731939eac4fc4b44872b087271216567%7C0%7C0%7C6387800636099fil34288UnknownTWFpbGZsb3d8eyJFbXB0U1hcGkiOnRydWUsIlYiOilwLjAuMDAwMCIsllAiOiJXaW4zMilslkFOIjoiTWFpbClsildUljoyfQ==%7C0%7C%7C%7C&sdata=JEFyfacBrjqR1C9dEXbaS2KjW2qYjj+roFIB112Wvg=&reserved=0Get hashmaliciousHTMLPhisherBrowse
                                            • 18.238.49.57
                                            http://www.ringaraja.net/portleti/katalogponudnikov/result.asp?id=4336&s=&t=51&p=50&url=https://furthercreation.com.sg/.deliveryportal/webm/#aaron.a.gil@saic.comGet hashmaliciousHTMLPhisherBrowse
                                            • 18.238.55.20
                                            moyjpadkkthaw.exeGet hashmaliciousVidarBrowse
                                            • 108.138.128.93
                                            jkse.arm7.elfGet hashmaliciousMiraiBrowse
                                            • 54.247.62.1
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 52.212.150.54
                                            jkse.mips.elfGet hashmaliciousUnknownBrowse
                                            • 13.226.8.150
                                            SC-906-GVA DESHBANDHU.exeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            jkse.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 34.245.97.29
                                            CANONICAL-ASGBna.elfGet hashmaliciousPrometeiBrowse
                                            • 91.189.91.42
                                            sshd.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 91.189.91.42
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 91.189.91.42
                                            jkse.arm6.elfGet hashmaliciousUnknownBrowse
                                            • 185.125.190.26
                                            splarm6.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            nklarm6.elfGet hashmaliciousUnknownBrowse
                                            • 185.125.190.26
                                            zerppc.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            zerm68k.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            nabarm6.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:ELF 32-bit LSB executable, ARM, EABI5 version 1 (GNU/Linux), statically linked, no section header
                                            Entropy (8bit):7.996610522717337
                                            TrID:
                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                            File name:.i.elf
                                            File size:59'368 bytes
                                            MD5:4745172a493b29e40a173b0f7673f04f
                                            SHA1:aeb5a1332a22777a9f77b17fa19e18cbb1161835
                                            SHA256:3d23ebeb41ecd3137ad96970b2b6c9d75c71e888dcd5f4162817f8567a772ff3
                                            SHA512:735ed970390ee311988bdb52bbae3841a21159c62e114b164e6e612a16091e6257047f92ed9dc439e58cdcdd89d99ffbba914704d499d0f7163ced69dcf5b8f4
                                            SSDEEP:1536:87vbq1lGAXSEYQjbChaAU2yU23M51DjZgSQAvS:8D+CAXFYQChaAUk5ljnQX
                                            TLSH:874302D0177527CC5371D8753DED305F8228292E72962D102EE7818AF85A61398B6DFD
                                            File Content Preview:.ELF..............(......'..4...........4. ...(......................7...7.............................................c........................i..........?.E.h;....#..$..O.%.......y.A.U"......-R..e....<l>=).!...O........u.....`o..*ziy"......R..~@....x2'_

                                            ELF header

                                            Class:ELF32
                                            Data:2's complement, little endian
                                            Version:1 (current)
                                            Machine:ARM
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - Linux
                                            ABI Version:0
                                            Entry Point Address:0x22718
                                            Flags:0x5000202
                                            ELF Header Size:52
                                            Program Header Offset:52
                                            Program Header Size:32
                                            Number of Program Headers:2
                                            Section Header Offset:0
                                            Section Header Size:40
                                            Number of Section Headers:0
                                            Header String Table Index:0
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x100000x100000x137e90x137e97.99660x5R E0x10000
                                            LOAD0x6fc0x506fc0x506fc0x00x00.00000x6RW 0x10000

                                            Download Network PCAP: filteredfull

                                            • Total Packets: 6
                                            • 443 (HTTPS)
                                            • 53 (DNS)
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 19, 2025 22:33:02.752718925 CET54632443192.168.2.1334.254.182.186
                                            Mar 19, 2025 22:33:06.592901945 CET48202443192.168.2.13185.125.190.26
                                            Mar 19, 2025 22:33:23.266839981 CET54632443192.168.2.1334.254.182.186
                                            Mar 19, 2025 22:33:23.444782972 CET4435463234.254.182.186192.168.2.13
                                            Mar 19, 2025 22:33:37.568979025 CET48202443192.168.2.13185.125.190.26
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 19, 2025 22:32:58.501511097 CET4681153192.168.2.131.1.1.1
                                            Mar 19, 2025 22:32:58.501590967 CET4324053192.168.2.131.1.1.1
                                            Mar 19, 2025 22:32:58.593238115 CET53468111.1.1.1192.168.2.13
                                            Mar 19, 2025 22:32:58.594928026 CET53432401.1.1.1192.168.2.13
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Mar 19, 2025 22:32:58.501511097 CET192.168.2.131.1.1.10x84e9Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                            Mar 19, 2025 22:32:58.501590967 CET192.168.2.131.1.1.10x542fStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Mar 19, 2025 22:32:58.593238115 CET1.1.1.1192.168.2.130x84e9No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                            Mar 19, 2025 22:32:58.593238115 CET1.1.1.1192.168.2.130x84e9No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):21:32:56
                                            Start date (UTC):19/03/2025
                                            Path:/tmp/.i.elf
                                            Arguments:/tmp/.i.elf
                                            File size:4956856 bytes
                                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                            Start time (UTC):21:33:22
                                            Start date (UTC):19/03/2025
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):21:33:22
                                            Start date (UTC):19/03/2025
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.0bzZ8ZV7xA /tmp/tmp.Z0OiFHaKuZ /tmp/tmp.u2nKULVaDT
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                            Start time (UTC):21:33:22
                                            Start date (UTC):19/03/2025
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):21:33:22
                                            Start date (UTC):19/03/2025
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.0bzZ8ZV7xA /tmp/tmp.Z0OiFHaKuZ /tmp/tmp.u2nKULVaDT
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b