Edit tour

Linux Analysis Report
arm6.elf

Overview

General Information

Sample name:arm6.elf
Analysis ID:1646132
MD5:401b495efa9869dea27da3f8f3378871
SHA1:db5f153c41eb31e1140c779cfc5d2784401f6e8b
SHA256:7949bcacfa5e109101323f674f8446883021e14a27399f0bfa474a6858af1e74
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:60
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample is packed with UPX
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646132
Start date and time:2025-03-23 12:12:20 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm6.elf
Detection:MAL
Classification:mal60.troj.evad.linELF@0/0@2/0
Command:/tmp/arm6.elf
PID:5524
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • arm6.elf (PID: 5524, Parent: 5441, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm6.elf
  • dash New Fork (PID: 5614, Parent: 3671)
  • rm (PID: 5614, Parent: 3671, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.yxYsCchbdn /tmp/tmp.Vl28DHoltX /tmp/tmp.mMyu6HBLHa
  • dash New Fork (PID: 5615, Parent: 3671)
  • rm (PID: 5615, Parent: 3671, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.yxYsCchbdn /tmp/tmp.Vl28DHoltX /tmp/tmp.mMyu6HBLHa
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
5524.1.00007f5634017000.00007f5634028000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: arm6.elfVirustotal: Detection: 34%Perma Link
    Source: arm6.elfReversingLabs: Detection: 38%
    Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
    Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
    Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
    Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
    Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
    Source: arm6.elfString found in binary or memory: http://upx.sf.net
    Source: unknownNetwork traffic detected: HTTP traffic on port 52472 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52472
    Source: unknownNetwork traffic detected: HTTP traffic on port 44524 -> 443
    Source: LOAD without section mappingsProgram segment: 0x8000
    Source: classification engineClassification label: mal60.troj.evad.linELF@0/0@2/0

    Data Obfuscation

    barindex
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
    Source: /usr/bin/dash (PID: 5614)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.yxYsCchbdn /tmp/tmp.Vl28DHoltX /tmp/tmp.mMyu6HBLHaJump to behavior
    Source: /usr/bin/dash (PID: 5615)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.yxYsCchbdn /tmp/tmp.Vl28DHoltX /tmp/tmp.mMyu6HBLHaJump to behavior
    Source: arm6.elfSubmission file: segment LOAD with 7.9601 entropy (max. 8.0)
    Source: /tmp/arm6.elf (PID: 5524)Queries kernel information via 'uname': Jump to behavior
    Source: arm6.elf, 5524.1.000055e33a0a2000.000055e33a2d0000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
    Source: arm6.elf, 5524.1.000055e33a0a2000.000055e33a2d0000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
    Source: arm6.elf, 5524.1.00007ffc2089e000.00007ffc208bf000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
    Source: arm6.elf, 5524.1.00007ffc2089e000.00007ffc208bf000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/arm6.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm6.elf
    Source: arm6.elf, 5524.1.00007ffc2089e000.00007ffc208bf000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 5524.1.00007f5634017000.00007f5634028000.r-x.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 5524.1.00007f5634017000.00007f5634028000.r-x.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
    Obfuscated Files or Information
    OS Credential Dumping11
    Security Software Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    File Deletion
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646132 Sample: arm6.elf Startdate: 23/03/2025 Architecture: LINUX Score: 60 12 34.254.182.186, 443 AMAZON-02US United States 2->12 14 54.247.62.1, 443, 52472 AMAZON-02US United States 2->14 16 daisy.ubuntu.com 2->16 18 Multi AV Scanner detection for submitted file 2->18 20 Yara detected Mirai 2->20 22 Sample is packed with UPX 2->22 6 dash rm 2->6         started        8 dash rm 2->8         started        10 arm6.elf 2->10         started        signatures3 process4

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    arm6.elf34%VirustotalBrowse
    arm6.elf39%ReversingLabsLinux.Trojan.Mirai
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches

    Download Network PCAP: filteredfull

    NameIPActiveMaliciousAntivirus DetectionReputation
    daisy.ubuntu.com
    162.213.35.24
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netarm6.elffalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        34.254.182.186
        unknownUnited States
        16509AMAZON-02USfalse
        54.247.62.1
        unknownUnited States
        16509AMAZON-02USfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        34.254.182.186x.rar.elfGet hashmaliciousXmrigBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            main_x86_64.elfGet hashmaliciousUnknownBrowse
              na.elfGet hashmaliciousPrometeiBrowse
                miner.elfGet hashmaliciousUnknownBrowse
                  na.elfGet hashmaliciousPrometeiBrowse
                    Space.arm5.elfGet hashmaliciousUnknownBrowse
                      arm.elfGet hashmaliciousUnknownBrowse
                        bot.arm6.elfGet hashmaliciousUnknownBrowse
                          hiss.arm7.elfGet hashmaliciousUnknownBrowse
                            54.247.62.1openssh.elfGet hashmaliciousGafgytBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  miner.elfGet hashmaliciousUnknownBrowse
                                    boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                      bot.arm6.elfGet hashmaliciousUnknownBrowse
                                        arc.elfGet hashmaliciousMiraiBrowse
                                          gigab.i686.elfGet hashmaliciousUnknownBrowse
                                            jkse.arm7.elfGet hashmaliciousMiraiBrowse
                                              na.elfGet hashmaliciousPrometeiBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                daisy.ubuntu.com.i.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                drea4.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                efea6.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.24
                                                boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.24
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                rrrdsl.elfGet hashmaliciousUnknownBrowse
                                                • 34.249.145.219
                                                drea4.elfGet hashmaliciousUnknownBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 54.171.230.55
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                rrrdsl.elfGet hashmaliciousUnknownBrowse
                                                • 34.249.145.219
                                                drea4.elfGet hashmaliciousUnknownBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 54.171.230.55
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.43.119.120
                                                No context
                                                No context
                                                No created / dropped files found
                                                File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (GNU/Linux), statically linked, no section header
                                                Entropy (8bit):7.95750232163825
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:arm6.elf
                                                File size:32'800 bytes
                                                MD5:401b495efa9869dea27da3f8f3378871
                                                SHA1:db5f153c41eb31e1140c779cfc5d2784401f6e8b
                                                SHA256:7949bcacfa5e109101323f674f8446883021e14a27399f0bfa474a6858af1e74
                                                SHA512:2c50a9ea9918a8cda338dcce3952f375285b5cef71928e5a15b3c9352a3c8027a747ad4352f5b6e06624ee3cca859c740e2d70da95befedc45e682ab78183e7e
                                                SSDEEP:768:c5/XkZJHsUwc2nW13iOVqOPlRgwWDiSmvACVa9q3UELAW:LJH9wc2EEXmvAyPLn
                                                TLSH:E3E2E143A551E5B2DE71063B9FBA2ECB9E81BFBCE2FD3012624C46194DF400469F9591
                                                File Content Preview:.ELF..............(.........4...........4. ...(......................~...~...............<..........................Q.td............................>. NUPX!........4...4.......S..........?.E.h;....#..$..1).~.#..v.G2...#...C.^...nu?.5......~.z........?.lzR

                                                ELF header

                                                Class:ELF32
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:ARM
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - Linux
                                                ABI Version:0
                                                Entry Point Address:0xed00
                                                Flags:0x4000002
                                                ELF Header Size:52
                                                Program Header Offset:52
                                                Program Header Size:32
                                                Number of Program Headers:3
                                                Section Header Offset:0
                                                Section Header Size:40
                                                Number of Section Headers:0
                                                Header String Table Index:0
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x80000x80000x7eed0x7eed7.96010x5R E0x8000
                                                LOAD0x3cf80x2bcf80x2bcf80x00x00.00000x6RW 0x8000
                                                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                                                Download Network PCAP: filteredfull

                                                • Total Packets: 7
                                                • 443 (HTTPS)
                                                • 53 (DNS)
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 23, 2025 12:13:08.706171036 CET44524443192.168.2.1534.254.182.186
                                                Mar 23, 2025 12:13:37.112298012 CET52472443192.168.2.1554.247.62.1
                                                Mar 23, 2025 12:13:37.112354994 CET4435247254.247.62.1192.168.2.15
                                                Mar 23, 2025 12:13:37.112499952 CET52472443192.168.2.1554.247.62.1
                                                Mar 23, 2025 12:13:37.114638090 CET52472443192.168.2.1554.247.62.1
                                                Mar 23, 2025 12:13:37.114659071 CET4435247254.247.62.1192.168.2.15
                                                Mar 23, 2025 12:14:37.111562967 CET52472443192.168.2.1554.247.62.1
                                                Mar 23, 2025 12:14:37.152354002 CET4435247254.247.62.1192.168.2.15
                                                Mar 23, 2025 12:15:13.249663115 CET4435247254.247.62.1192.168.2.15
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 23, 2025 12:13:09.822886944 CET4783553192.168.2.151.1.1.1
                                                Mar 23, 2025 12:13:09.822969913 CET5479053192.168.2.151.1.1.1
                                                Mar 23, 2025 12:13:09.921000957 CET53547901.1.1.1192.168.2.15
                                                Mar 23, 2025 12:13:09.921750069 CET53478351.1.1.1192.168.2.15
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Mar 23, 2025 12:13:09.822886944 CET192.168.2.151.1.1.10xf776Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                Mar 23, 2025 12:13:09.822969913 CET192.168.2.151.1.1.10x657bStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Mar 23, 2025 12:13:09.921750069 CET1.1.1.1192.168.2.150xf776No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                                Mar 23, 2025 12:13:09.921750069 CET1.1.1.1192.168.2.150xf776No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                                System Behavior

                                                Start time (UTC):11:13:07
                                                Start date (UTC):23/03/2025
                                                Path:/tmp/arm6.elf
                                                Arguments:/tmp/arm6.elf
                                                File size:4956856 bytes
                                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                Start time (UTC):11:14:36
                                                Start date (UTC):23/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):11:14:36
                                                Start date (UTC):23/03/2025
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.yxYsCchbdn /tmp/tmp.Vl28DHoltX /tmp/tmp.mMyu6HBLHa
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                Start time (UTC):11:14:36
                                                Start date (UTC):23/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):11:14:36
                                                Start date (UTC):23/03/2025
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.yxYsCchbdn /tmp/tmp.Vl28DHoltX /tmp/tmp.mMyu6HBLHa
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b