Edit tour

Linux Analysis Report
killua.x86.elf

Overview

General Information

Sample name:killua.x86.elf
Analysis ID:1646268
MD5:eb7d52b87ef91c7012c31b5e182967cc
SHA1:13480e526651b03336a433a1550c96de7c321792
SHA256:b4f2e5298a677871df72418d8a63ecc8dd22a7c0eee79936e06c2a3c2e425696
Tags:elfuser-rollcalcifer
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Reads system information from the proc file system
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646268
Start date and time:2025-03-23 19:47:14 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:killua.x86.elf
Detection:MAL
Classification:mal52.evad.linELF@0/0@6/0
  • VT rate limit hit for: kittylover321.shop
Command:/tmp/killua.x86.elf
PID:5432
Exit Code:
Exit Code Info:
Killed:True
Standard Output:
t.me/kittylover321 golang botnet guys
Standard Error:
  • system is lnxubuntu20
  • killua.x86.elf (PID: 5432, Parent: 5356, MD5: eb7d52b87ef91c7012c31b5e182967cc) Arguments: /tmp/killua.x86.elf
    • sh (PID: 5438, Parent: 5432, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /usr/bin/sh -c "ulimit -n 9999999"
    • sh (PID: 5439, Parent: 5432, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /usr/bin/sh -c "ulimit -u 9999999"
    • killua.x86.elf (PID: 5440, Parent: 5432, MD5: eb7d52b87ef91c7012c31b5e182967cc) Arguments: /tmp/killua.x86.elf
  • udisksd New Fork (PID: 5451, Parent: 802)
  • dumpe2fs (PID: 5451, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5540, Parent: 802)
  • dumpe2fs (PID: 5540, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: killua.x86.elfVirustotal: Detection: 9%Perma Link
Source: killua.x86.elfReversingLabs: Detection: 16%
Source: global trafficTCP traffic: 192.168.2.13:49470 -> 176.65.134.43:3333
Source: /tmp/killua.x86.elf (PID: 5432)Reads hosts file: /etc/hostsJump to behavior
Source: /tmp/killua.x86.elf (PID: 5440)Reads hosts file: /etc/hostsJump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: kittylover321.shop
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: killua.x86.elfString found in binary or memory: http://upx.sf.net
Source: LOAD without section mappingsProgram segment: 0x8048000
Source: classification engineClassification label: mal52.evad.linELF@0/0@6/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.95 Copyright (C) 1996-2018 the UPX Team. All Rights Reserved. $
Source: /tmp/killua.x86.elf (PID: 5432)Reads from proc file: /proc/meminfoJump to behavior
Source: /tmp/killua.x86.elf (PID: 5432)Reads from proc file: /proc/sys/net/core/somaxconnJump to behavior
Source: /tmp/killua.x86.elf (PID: 5440)Reads from proc file: /proc/meminfoJump to behavior
Source: killua.x86.elfSubmission file: segment LOAD with 7.9996 entropy (max. 8.0)
Source: /tmp/killua.x86.elf (PID: 5432)Queries kernel information via 'uname': Jump to behavior
Source: /tmp/killua.x86.elf (PID: 5440)Queries kernel information via 'uname': Jump to behavior
Source: killua.x86.elf, 5432.1.0000000008800000.0000000008c00000.rw-.sdmpBinary or memory string: /tmp//vmware-root_727-4290690966/tmp//vmware-root_727-4290690966Deleted config-err-IN1GlB
Source: killua.x86.elf, 5432.1.0000000008800000.0000000008c00000.rw-.sdmpBinary or memory string: /tmp//vmware-root_727-4290690966/tmp//vmware-root_727-4290690966/tmp//vmware-root_727-4290690966Deleted vmware-root_727-42906909662
Source: killua.x86.elf, 5432.1.0000000008800000.0000000008c00000.rw-.sdmpBinary or memory string: /tmp//vmware-root_727-4290690966
Source: killua.x86.elf, 5432.1.0000000008800000.0000000008c00000.rw-.sdmpBinary or memory string: Deleted vmware-root_727-4290690966
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646268 Sample: killua.x86.elf Startdate: 23/03/2025 Architecture: LINUX Score: 52 24 kittylover321.shop 176.65.134.43, 3333, 45276, 49470 DIOGELO-ASGB Germany 2->24 26 daisy.ubuntu.com 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Sample is packed with UPX 2->30 8 killua.x86.elf 2->8         started        10 udisksd dumpe2fs 2->10         started        12 udisksd dumpe2fs 2->12         started        signatures3 process4 process5 14 killua.x86.elf killua.x86.elf 8->14         started        16 killua.x86.elf sh 8->16         started        18 killua.x86.elf sh 8->18         started        20 killua.x86.elf 8->20         started        process6 22 killua.x86.elf 14->22         started       
SourceDetectionScannerLabelLink
killua.x86.elf9%VirustotalBrowse
killua.x86.elf17%ReversingLabsLinux.Trojan.ZkarletFlash
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    kittylover321.shop
    176.65.134.43
    truefalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netkillua.x86.elffalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        176.65.134.43
        kittylover321.shopGermany
        56325DIOGELO-ASGBfalse
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        daisy.ubuntu.comgigab.sh4.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.24
        yakuza.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        yakuza.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        yakuza.i586.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        yakuza.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        yakuza.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        yakuza.sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        yakuza.x32.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        m68k.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        sshd.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.25
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        DIOGELO-ASGBa55fee51fe469b7ed4f23ef3753b380fb548d65f40306962.pptm.ps1Get hashmaliciousRHADAMANTHYSBrowse
        • 176.65.134.153
        sparc.nn.elfGet hashmaliciousMiraiBrowse
        • 176.65.134.15
        jae1h6e218.exeGet hashmaliciousRHADAMANTHYSBrowse
        • 176.65.134.145
        5IY8PW2nOl.exeGet hashmaliciousRHADAMANTHYSBrowse
        • 176.65.134.145
        tdm.jsGet hashmaliciousRemcosBrowse
        • 176.65.134.41
        morte.x64.elfGet hashmaliciousUnknownBrowse
        • 176.65.134.62
        morte.m68k.elfGet hashmaliciousUnknownBrowse
        • 176.65.134.62
        morte.mips.elfGet hashmaliciousUnknownBrowse
        • 176.65.134.62
        morte.arm.elfGet hashmaliciousUnknownBrowse
        • 176.65.134.62
        morte.x86.elfGet hashmaliciousUnknownBrowse
        • 176.65.134.62
        No context
        No context
        No created / dropped files found
        File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
        Entropy (8bit):7.999581013628897
        TrID:
        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
        File name:killua.x86.elf
        File size:773'504 bytes
        MD5:eb7d52b87ef91c7012c31b5e182967cc
        SHA1:13480e526651b03336a433a1550c96de7c321792
        SHA256:b4f2e5298a677871df72418d8a63ecc8dd22a7c0eee79936e06c2a3c2e425696
        SHA512:d09fbc1c9fe10928b89857c07638935c158c6b7c19a6b21f011853620290b15f04ea1e3be3c86d04e3365230b3917ae331a915a5d21b20d8c203e4d5f8ec9b26
        SSDEEP:12288:0umUwLjBP+ZIzmtuRwCDTjJMgVgl1U7zSu+3/bohuaMie6o8kXpKA1aPD73lxUmL:0TUuPPzmCFgl1UfSnvbSeie6fk5KQgDX
        TLSH:EEF4338339CFE440A5A2B47B26F00787C270BFE2CEBD85EAB75B7027154B457C60955A
        File Content Preview:.ELF.....................:..4...........4. ...(..............................................P...P..................Q.td.............................i.(UPX!.........@$..@$.....}..........?.E.h;....#..|`SS.....u ....\..G=...X0.......}.....i.....S.!.....#u.

        ELF header

        Class:ELF32
        Data:2's complement, little endian
        Version:1 (current)
        Machine:Intel 80386
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - Linux
        ABI Version:0
        Entry Point Address:0x8103a10
        Flags:0x0
        ELF Header Size:52
        Program Header Offset:52
        Program Header Size:32
        Number of Program Headers:3
        Section Header Offset:0
        Section Header Size:40
        Number of Section Headers:0
        Header String Table Index:0
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x80480000x80480000xbcc8d0xbcc8d7.99960x5R E0x1000
        LOAD0x00x81050000x81050000x00x198ea00.00000x6RW 0x1000
        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

        Download Network PCAP: filteredfull

        • Total Packets: 24
        • 3333 undefined
        • 80 (HTTP)
        • 53 (DNS)
        TimestampSource PortDest PortSource IPDest IP
        Mar 23, 2025 19:48:02.879729033 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:02.894180059 CET494703333192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:03.082528114 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:03.082880020 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:03.083561897 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:03.111162901 CET333349470176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:03.111392021 CET494703333192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:03.112282991 CET494703333192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:03.113153934 CET494703333192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:03.285115957 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:03.327532053 CET333349470176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:03.347080946 CET333349470176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:03.347280979 CET494703333192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:18.287432909 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:18.420490026 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:18.420715094 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:18.499109030 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:33.499466896 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:33.627283096 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:33.627449989 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:33.702019930 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:48:47.507836103 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:48:47.760704041 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:49:02.966484070 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:49:02.966706038 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:49:18.170865059 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:49:18.171140909 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:49:33.428461075 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:49:33.428781033 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:49:48.631968975 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:49:48.632246017 CET4527680192.168.2.13176.65.134.43
        Mar 23, 2025 19:50:03.891333103 CET8045276176.65.134.43192.168.2.13
        Mar 23, 2025 19:50:03.891797066 CET4527680192.168.2.13176.65.134.43
        TimestampSource PortDest PortSource IPDest IP
        Mar 23, 2025 19:48:02.605021000 CET4373553192.168.2.138.8.8.8
        Mar 23, 2025 19:48:02.606476068 CET4729753192.168.2.138.8.8.8
        Mar 23, 2025 19:48:02.702701092 CET53437358.8.8.8192.168.2.13
        Mar 23, 2025 19:48:02.713655949 CET53472978.8.8.8192.168.2.13
        Mar 23, 2025 19:48:03.026115894 CET5784853192.168.2.138.8.8.8
        Mar 23, 2025 19:48:03.026273966 CET5584153192.168.2.138.8.8.8
        Mar 23, 2025 19:48:03.136426926 CET53558418.8.8.8192.168.2.13
        Mar 23, 2025 19:48:03.136459112 CET53578488.8.8.8192.168.2.13
        Mar 23, 2025 19:50:46.782079935 CET4987753192.168.2.131.1.1.1
        Mar 23, 2025 19:50:46.782195091 CET5311853192.168.2.131.1.1.1
        Mar 23, 2025 19:50:46.880039930 CET53531181.1.1.1192.168.2.13
        Mar 23, 2025 19:50:46.881237984 CET53498771.1.1.1192.168.2.13
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Mar 23, 2025 19:48:02.605021000 CET192.168.2.138.8.8.80xaccfStandard query (0)kittylover321.shop28IN (0x0001)false
        Mar 23, 2025 19:48:02.606476068 CET192.168.2.138.8.8.80xe56cStandard query (0)kittylover321.shopA (IP address)IN (0x0001)false
        Mar 23, 2025 19:48:03.026115894 CET192.168.2.138.8.8.80xda04Standard query (0)kittylover321.shop28IN (0x0001)false
        Mar 23, 2025 19:48:03.026273966 CET192.168.2.138.8.8.80x4d1bStandard query (0)kittylover321.shopA (IP address)IN (0x0001)false
        Mar 23, 2025 19:50:46.782079935 CET192.168.2.131.1.1.10x7740Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
        Mar 23, 2025 19:50:46.782195091 CET192.168.2.131.1.1.10x5b2fStandard query (0)daisy.ubuntu.com28IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Mar 23, 2025 19:48:02.713655949 CET8.8.8.8192.168.2.130xe56cNo error (0)kittylover321.shop176.65.134.43A (IP address)IN (0x0001)false
        Mar 23, 2025 19:48:03.136426926 CET8.8.8.8192.168.2.130x4d1bNo error (0)kittylover321.shop176.65.134.43A (IP address)IN (0x0001)false
        Mar 23, 2025 19:50:46.881237984 CET1.1.1.1192.168.2.130x7740No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
        Mar 23, 2025 19:50:46.881237984 CET1.1.1.1192.168.2.130x7740No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
        Session IDSource IPSource PortDestination IPDestination Port
        0192.168.2.1345276176.65.134.4380
        TimestampBytes transferredDirectionData
        Mar 23, 2025 19:48:03.083561897 CET31OUTData Raw: 75 6e 6b 6e 6f 77 6e 3b 74 72 75 65 3b 32 3b 32 39 39 32
        Data Ascii: unknown;true;2;2992


        System Behavior

        Start time (UTC):18:48:01
        Start date (UTC):23/03/2025
        Path:/tmp/killua.x86.elf
        Arguments:/tmp/killua.x86.elf
        File size:773504 bytes
        MD5 hash:eb7d52b87ef91c7012c31b5e182967cc

        Start time (UTC):18:48:01
        Start date (UTC):23/03/2025
        Path:/tmp/killua.x86.elf
        Arguments:-
        File size:773504 bytes
        MD5 hash:eb7d52b87ef91c7012c31b5e182967cc
        Start time (UTC):18:48:01
        Start date (UTC):23/03/2025
        Path:/tmp/killua.x86.elf
        Arguments:-
        File size:773504 bytes
        MD5 hash:eb7d52b87ef91c7012c31b5e182967cc

        Start time (UTC):18:48:01
        Start date (UTC):23/03/2025
        Path:/usr/bin/sh
        Arguments:/usr/bin/sh -c "ulimit -n 9999999"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):18:48:01
        Start date (UTC):23/03/2025
        Path:/tmp/killua.x86.elf
        Arguments:-
        File size:773504 bytes
        MD5 hash:eb7d52b87ef91c7012c31b5e182967cc

        Start time (UTC):18:48:01
        Start date (UTC):23/03/2025
        Path:/usr/bin/sh
        Arguments:/usr/bin/sh -c "ulimit -u 9999999"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):18:48:02
        Start date (UTC):23/03/2025
        Path:/tmp/killua.x86.elf
        Arguments:-
        File size:773504 bytes
        MD5 hash:eb7d52b87ef91c7012c31b5e182967cc

        Start time (UTC):18:48:02
        Start date (UTC):23/03/2025
        Path:/tmp/killua.x86.elf
        Arguments:/tmp/killua.x86.elf
        File size:773504 bytes
        MD5 hash:eb7d52b87ef91c7012c31b5e182967cc

        Start time (UTC):18:48:02
        Start date (UTC):23/03/2025
        Path:/tmp/killua.x86.elf
        Arguments:-
        File size:773504 bytes
        MD5 hash:eb7d52b87ef91c7012c31b5e182967cc

        Start time (UTC):18:48:02
        Start date (UTC):23/03/2025
        Path:/usr/lib/udisks2/udisksd
        Arguments:-
        File size:483056 bytes
        MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

        Start time (UTC):18:48:02
        Start date (UTC):23/03/2025
        Path:/usr/sbin/dumpe2fs
        Arguments:dumpe2fs -h /dev/dm-0
        File size:31112 bytes
        MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

        Start time (UTC):18:48:46
        Start date (UTC):23/03/2025
        Path:/usr/lib/udisks2/udisksd
        Arguments:-
        File size:483056 bytes
        MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

        Start time (UTC):18:48:46
        Start date (UTC):23/03/2025
        Path:/usr/sbin/dumpe2fs
        Arguments:dumpe2fs -h /dev/dm-0
        File size:31112 bytes
        MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4