Edit tour

Linux Analysis Report
miner.elf

Overview

General Information

Sample name:miner.elf
Analysis ID:1644284
MD5:764f39c02bfcbdf1f3c87ab42509beaf
SHA1:cbc82b8af274bde0dafa884f23a4f9ef8bbe3b82
SHA256:9edd2cf2c47687524367ea6bc218db30b625d6ee45afb0fa96f4ec21ae0ecf94
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Sample contains only a LOAD segment without any section mappings

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1644284
Start date and time:2025-03-20 14:11:39 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 24s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:miner.elf
Detection:MAL
Classification:mal48.linELF@0/0@2/0
Command:/tmp/miner.elf
PID:5497
Exit Code:135
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • miner.elf (PID: 5497, Parent: 5418, MD5: 764f39c02bfcbdf1f3c87ab42509beaf) Arguments: /tmp/miner.elf
  • dash New Fork (PID: 5592, Parent: 3632)
  • rm (PID: 5592, Parent: 3632, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.eSpHmcaE3C /tmp/tmp.PI19sWv79j /tmp/tmp.pwio07CKVj
  • dash New Fork (PID: 5593, Parent: 3632)
  • rm (PID: 5593, Parent: 3632, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.eSpHmcaE3C /tmp/tmp.PI19sWv79j /tmp/tmp.pwio07CKVj
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: miner.elfVirustotal: Detection: 17%Perma Link
Source: miner.elfReversingLabs: Detection: 19%
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 34590 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42476 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42476
Source: LOAD without section mappingsProgram segment: 0x400000
Source: classification engineClassification label: mal48.linELF@0/0@2/0
Source: /usr/bin/dash (PID: 5592)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.eSpHmcaE3C /tmp/tmp.PI19sWv79j /tmp/tmp.pwio07CKVjJump to behavior
Source: /usr/bin/dash (PID: 5593)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.eSpHmcaE3C /tmp/tmp.PI19sWv79j /tmp/tmp.pwio07CKVjJump to behavior
Source: miner.elfSubmission file: segment LOAD with 7.9998 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Obfuscated Files or Information
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1644284 Sample: miner.elf Startdate: 20/03/2025 Architecture: LINUX Score: 48 12 34.243.160.129, 42476, 443 AMAZON-02US United States 2->12 14 54.217.10.153, 443 AMAZON-02US United States 2->14 16 daisy.ubuntu.com 2->16 18 Multi AV Scanner detection for submitted file 2->18 6 dash rm 2->6         started        8 dash rm 2->8         started        10 miner.elf 2->10         started        signatures3 process4
SourceDetectionScannerLabelLink
miner.elf17%VirustotalBrowse
miner.elf19%ReversingLabsLinux.Trojan.Multiverze
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    54.217.10.153
    unknownUnited States
    16509AMAZON-02USfalse
    34.243.160.129
    unknownUnited States
    16509AMAZON-02USfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    54.217.10.153psmips.elfGet hashmaliciousUnknownBrowse
      yakuza.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
        main_x86.elfGet hashmaliciousMiraiBrowse
          jkse.arm7.elfGet hashmaliciousMiraiBrowse
            re.bot.mips.elfGet hashmaliciousUnknownBrowse
              45.126.126.33-sora.arm-2025-03-12T01_48_26.elfGet hashmaliciousMiraiBrowse
                efea6.elfGet hashmaliciousMiraiBrowse
                  tftp.elfGet hashmaliciousUnknownBrowse
                    arm6.elfGet hashmaliciousUnknownBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        34.243.160.129arm.elfGet hashmaliciousUnknownBrowse
                          main_x86.elfGet hashmaliciousMiraiBrowse
                            hiss.arm7.elfGet hashmaliciousUnknownBrowse
                              gigab.i686.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  na.elfGet hashmaliciousPrometeiBrowse
                                    na.elfGet hashmaliciousPrometeiBrowse
                                      hide.spc.elfGet hashmaliciousUnknownBrowse
                                        na.elfGet hashmaliciousPrometeiBrowse
                                          arm7.nn.elfGet hashmaliciousMiraiBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            daisy.ubuntu.comhoho.i686.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            sshd.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            Space.spc.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            Nyx4r.arm6.elfGet hashmaliciousOkiruBrowse
                                            • 162.213.35.24
                                            Nyx4r.m68k.elfGet hashmaliciousOkiruBrowse
                                            • 162.213.35.25
                                            Nyx4r.arm5.elfGet hashmaliciousOkiruBrowse
                                            • 162.213.35.24
                                            Nyx4r.x86.elfGet hashmaliciousOkiruBrowse
                                            • 162.213.35.25
                                            hoho.mips.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            hoho.i486.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            arm7.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AMAZON-02UShoho.powerpc.elfGet hashmaliciousUnknownBrowse
                                            • 54.171.230.55
                                            hoho.sparc.elfGet hashmaliciousUnknownBrowse
                                            • 52.35.74.180
                                            hoho.sh4.elfGet hashmaliciousUnknownBrowse
                                            • 52.222.196.136
                                            Space.ppc.elfGet hashmaliciousUnknownBrowse
                                            • 34.249.145.219
                                            Space.arm6.elfGet hashmaliciousUnknownBrowse
                                            • 54.171.230.55
                                            Space.m68k.elfGet hashmaliciousMiraiBrowse
                                            • 34.249.145.219
                                            https://mandrillapp.com/track/click/30319935/app.axure.cloud?p=eyJzIjoiVlZjanVlTVFEa1dCMEdNcWdqM3N2M1V2TXRzIiwidiI6MSwicCI6IntcInVcIjozMDMxOTkzNSxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5heHVyZS5jbG91ZFxcXC9ERFZPOUhcXFwvXCIsXCJpZFwiOlwiMWRmZjdjZjYyZmFhNGNiN2I5NWI1MjA4Y2FjM2I2MzJcIixcInVybF9pZHNcIjpbXCIzNjBjNGIwODczODAyZGVjZTE1NTNhYmM1MGQwZjViMGMyNTdjMzM2XCJdfSJ9Get hashmaliciousHTMLPhisherBrowse
                                            • 18.238.80.100
                                            Nyx4r.ppc.elfGet hashmaliciousOkiruBrowse
                                            • 18.190.189.22
                                            Nyx4r.arm.elfGet hashmaliciousOkiruBrowse
                                            • 65.1.108.4
                                            Space.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 34.254.182.186
                                            AMAZON-02UShoho.powerpc.elfGet hashmaliciousUnknownBrowse
                                            • 54.171.230.55
                                            hoho.sparc.elfGet hashmaliciousUnknownBrowse
                                            • 52.35.74.180
                                            hoho.sh4.elfGet hashmaliciousUnknownBrowse
                                            • 52.222.196.136
                                            Space.ppc.elfGet hashmaliciousUnknownBrowse
                                            • 34.249.145.219
                                            Space.arm6.elfGet hashmaliciousUnknownBrowse
                                            • 54.171.230.55
                                            Space.m68k.elfGet hashmaliciousMiraiBrowse
                                            • 34.249.145.219
                                            https://mandrillapp.com/track/click/30319935/app.axure.cloud?p=eyJzIjoiVlZjanVlTVFEa1dCMEdNcWdqM3N2M1V2TXRzIiwidiI6MSwicCI6IntcInVcIjozMDMxOTkzNSxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5heHVyZS5jbG91ZFxcXC9ERFZPOUhcXFwvXCIsXCJpZFwiOlwiMWRmZjdjZjYyZmFhNGNiN2I5NWI1MjA4Y2FjM2I2MzJcIixcInVybF9pZHNcIjpbXCIzNjBjNGIwODczODAyZGVjZTE1NTNhYmM1MGQwZjViMGMyNTdjMzM2XCJdfSJ9Get hashmaliciousHTMLPhisherBrowse
                                            • 18.238.80.100
                                            Nyx4r.ppc.elfGet hashmaliciousOkiruBrowse
                                            • 18.190.189.22
                                            Nyx4r.arm.elfGet hashmaliciousOkiruBrowse
                                            • 65.1.108.4
                                            Space.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 34.254.182.186
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, no section header
                                            Entropy (8bit):7.9997865452850325
                                            TrID:
                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                            File name:miner.elf
                                            File size:913'707 bytes
                                            MD5:764f39c02bfcbdf1f3c87ab42509beaf
                                            SHA1:cbc82b8af274bde0dafa884f23a4f9ef8bbe3b82
                                            SHA256:9edd2cf2c47687524367ea6bc218db30b625d6ee45afb0fa96f4ec21ae0ecf94
                                            SHA512:72629d8195085a1c746e378fd56db6e44fe45cbb0e73685cd049edbb091cfe59da87e6b03c7d2e0864016b09eda62954d26eece388e06f83eca33203afda953b
                                            SSDEEP:24576:PvswhZT3/QJLfl1X+Q47tv7T6inGEDOdiru3eSlNF7:njEflQ/573nydbeO/
                                            TLSH:3A1533DE20E724FBC97007B42AFD4C43D69E2074CD2E2E459CB5981CAE85F46A3258DE
                                            File Content Preview:.ELF..............>.......[.....@...................@.8...@.......................@.......@....................... .............`.......`.......`......................... .....)]..UPX!L.........K...K.X...k..........?.E.h=.......N......e...U.....bo.G...y..

                                            ELF header

                                            Class:ELF64
                                            Data:2's complement, little endian
                                            Version:1 (current)
                                            Machine:Advanced Micro Devices X86-64
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - Linux
                                            ABI Version:0
                                            Entry Point Address:0x5bd090
                                            Flags:0x0
                                            ELF Header Size:64
                                            Program Header Offset:64
                                            Program Header Size:56
                                            Number of Program Headers:2
                                            Section Header Offset:0
                                            Section Header Size:64
                                            Number of Section Headers:0
                                            Header String Table Index:0
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x4000000x4000000x1be1cd0x1be1cd7.99980x5R E0x200000
                                            LOAD0xcfb600xacfb600xacfb600x00x00.00000x6RW 0x200000

                                            Download Network PCAP: filteredfull

                                            • Total Packets: 7
                                            • 443 (HTTPS)
                                            • 53 (DNS)
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 20, 2025 14:12:22.514650106 CET34590443192.168.2.1454.217.10.153
                                            Mar 20, 2025 14:12:50.933932066 CET42476443192.168.2.1434.243.160.129
                                            Mar 20, 2025 14:12:50.933967113 CET4434247634.243.160.129192.168.2.14
                                            Mar 20, 2025 14:12:50.934081078 CET42476443192.168.2.1434.243.160.129
                                            Mar 20, 2025 14:12:50.937828064 CET42476443192.168.2.1434.243.160.129
                                            Mar 20, 2025 14:12:50.937843084 CET4434247634.243.160.129192.168.2.14
                                            Mar 20, 2025 14:13:50.932348967 CET42476443192.168.2.1434.243.160.129
                                            Mar 20, 2025 14:13:50.976321936 CET4434247634.243.160.129192.168.2.14
                                            Mar 20, 2025 14:14:25.421607018 CET4434247634.243.160.129192.168.2.14
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 20, 2025 14:12:22.563395023 CET5462553192.168.2.148.8.8.8
                                            Mar 20, 2025 14:12:22.563479900 CET6009953192.168.2.148.8.8.8
                                            Mar 20, 2025 14:12:22.656039000 CET53600998.8.8.8192.168.2.14
                                            Mar 20, 2025 14:12:22.660732031 CET53546258.8.8.8192.168.2.14
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Mar 20, 2025 14:12:22.563395023 CET192.168.2.148.8.8.80xa08aStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                            Mar 20, 2025 14:12:22.563479900 CET192.168.2.148.8.8.80xdf3fStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Mar 20, 2025 14:12:22.660732031 CET8.8.8.8192.168.2.140xa08aNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                            Mar 20, 2025 14:12:22.660732031 CET8.8.8.8192.168.2.140xa08aNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):13:12:21
                                            Start date (UTC):20/03/2025
                                            Path:/tmp/miner.elf
                                            Arguments:/tmp/miner.elf
                                            File size:913707 bytes
                                            MD5 hash:764f39c02bfcbdf1f3c87ab42509beaf
                                            Start time (UTC):13:13:50
                                            Start date (UTC):20/03/2025
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):13:13:50
                                            Start date (UTC):20/03/2025
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.eSpHmcaE3C /tmp/tmp.PI19sWv79j /tmp/tmp.pwio07CKVj
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                            Start time (UTC):13:13:50
                                            Start date (UTC):20/03/2025
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):13:13:50
                                            Start date (UTC):20/03/2025
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.eSpHmcaE3C /tmp/tmp.PI19sWv79j /tmp/tmp.pwio07CKVj
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b