Edit tour

Linux Analysis Report
pmpsl.elf

Overview

General Information

Sample name:pmpsl.elf
Analysis ID:1646328
MD5:c6e97e7019d1deb2815994f5c7241c09
SHA1:a5e74b0b0884efbdae0c27433db1bf7e702a9ea1
SHA256:fd69c599111ca3d7dbe937c74df58b1933d69fea6f47636d485bf5321135b6fe
Tags:user-elfdigest
Infos:

Detection

Mirai
Score:72
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample deletes itself
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646328
Start date and time:2025-03-23 22:31:33 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:pmpsl.elf
Detection:MAL
Classification:mal72.troj.evad.linELF@0/0@2/0
Command:/tmp/pmpsl.elf
PID:5475
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
im in deep sorrow.
Standard Error:
  • system is lnxubuntu20
  • pmpsl.elf (PID: 5475, Parent: 5397, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/pmpsl.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
5475.1.00007f08c0400000.00007f08c041b000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
    5479.1.00007f08c0400000.00007f08c041b000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: pmpsl.elfAvira: detected
      Source: pmpsl.elfVirustotal: Detection: 25%Perma Link
      Source: pmpsl.elfReversingLabs: Detection: 30%
      Source: global trafficTCP traffic: 192.168.2.13:33632 -> 193.32.162.27:18129
      Source: /tmp/pmpsl.elf (PID: 5475)Socket: 127.0.0.1:18129Jump to behavior
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
      Source: pmpsl.elfString found in binary or memory: http://upx.sf.net
      Source: LOAD without section mappingsProgram segment: 0x100000
      Source: /tmp/pmpsl.elf (PID: 5479)SIGKILL sent: pid: 660, result: successfulJump to behavior
      Source: classification engineClassification label: mal72.troj.evad.linELF@0/0@2/0

      Data Obfuscation

      barindex
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/pmpsl.elf (PID: 5475)File: /tmp/pmpsl.elfJump to behavior
      Source: pmpsl.elfSubmission file: segment LOAD with 7.9449 entropy (max. 8.0)
      Source: /tmp/pmpsl.elf (PID: 5475)Queries kernel information via 'uname': Jump to behavior
      Source: pmpsl.elf, 5475.1.000055f329ede000.000055f329f65000.rw-.sdmp, pmpsl.elf, 5479.1.000055f329ede000.000055f329f65000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
      Source: pmpsl.elf, 5475.1.00007ffdf397a000.00007ffdf399b000.rw-.sdmp, pmpsl.elf, 5479.1.00007ffdf397a000.00007ffdf399b000.rw-.sdmpBinary or memory string: ^HW&x86_64/usr/bin/qemu-mipsel/tmp/pmpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/pmpsl.elf
      Source: pmpsl.elf, 5475.1.000055f329ede000.000055f329f65000.rw-.sdmp, pmpsl.elf, 5479.1.000055f329ede000.000055f329f65000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
      Source: pmpsl.elf, 5475.1.00007ffdf397a000.00007ffdf399b000.rw-.sdmp, pmpsl.elf, 5479.1.00007ffdf397a000.00007ffdf399b000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
      Source: pmpsl.elf, 5479.1.00007ffdf397a000.00007ffdf399b000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 5475.1.00007f08c0400000.00007f08c041b000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5479.1.00007f08c0400000.00007f08c041b000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 5475.1.00007f08c0400000.00007f08c041b000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5479.1.00007f08c0400000.00007f08c041b000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
      Obfuscated Files or Information
      OS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      File Deletion
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646328 Sample: pmpsl.elf Startdate: 23/03/2025 Architecture: LINUX Score: 72 17 193.32.162.27, 18129, 33632 DATACENTERRO Romania 2->17 19 daisy.ubuntu.com 2->19 21 Antivirus / Scanner detection for submitted sample 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Yara detected Mirai 2->25 27 Sample is packed with UPX 2->27 8 pmpsl.elf 2->8         started        signatures3 process4 signatures5 29 Sample deletes itself 8->29 11 pmpsl.elf 8->11         started        process6 process7 13 pmpsl.elf 11->13         started        15 pmpsl.elf 11->15         started       
      SourceDetectionScannerLabelLink
      pmpsl.elf25%VirustotalBrowse
      pmpsl.elf31%ReversingLabsLinux.Trojan.Mirai
      pmpsl.elf100%AviraEXP/ELF.Agent.M.28
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches

      Download Network PCAP: filteredfull

      NameIPActiveMaliciousAntivirus DetectionReputation
      daisy.ubuntu.com
      162.213.35.25
      truefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netpmpsl.elffalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          193.32.162.27
          unknownRomania
          35478DATACENTERROfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          193.32.162.27px86.elfGet hashmaliciousMiraiBrowse
            pmips.elfGet hashmaliciousMiraiBrowse
              parm.elfGet hashmaliciousMiraiBrowse
                parm7.elfGet hashmaliciousMiraiBrowse
                  parm6.elfGet hashmaliciousMiraiBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    daisy.ubuntu.comparm.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    parm7.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.25
                    sshd.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.25
                    killua.x86.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.24
                    gigab.sh4.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.24
                    yakuza.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 162.213.35.24
                    yakuza.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 162.213.35.24
                    yakuza.i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 162.213.35.24
                    yakuza.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 162.213.35.24
                    yakuza.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 162.213.35.24
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    DATACENTERROpx86.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.27
                    pmips.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.27
                    parm.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.27
                    parm7.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.27
                    parm6.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.27
                    phantom.arm.elfGet hashmaliciousUnknownBrowse
                    • 194.85.251.76
                    boatnet.x86.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.38
                    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.38
                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.38
                    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                    • 193.32.162.38
                    No context
                    No context
                    No created / dropped files found
                    File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
                    Entropy (8bit):7.955201541773767
                    TrID:
                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                    File name:pmpsl.elf
                    File size:50'520 bytes
                    MD5:c6e97e7019d1deb2815994f5c7241c09
                    SHA1:a5e74b0b0884efbdae0c27433db1bf7e702a9ea1
                    SHA256:fd69c599111ca3d7dbe937c74df58b1933d69fea6f47636d485bf5321135b6fe
                    SHA512:564164156fac1b435afd0728eb10ba6e61a114773492f1f3202b613adf554904850f1269ceeb47fb59deb0e175c4de1281c79abb24e6f74b6b8afc98a7a284f8
                    SSDEEP:768:nbbIVTCpNpqW10FtrDS+tZb9ddQm8MSbhYhFkQkVmKTlFHcmW5DQYgmJaD9UkV:nbcCfpqY0FtKm8h4uVmAlFHagyaqS
                    TLSH:0033F16EA539A38ECA65AEF977EC09880F8955D133EF9F0893214DA85BC4C0D6C4D12D
                    File Content Preview:.ELF....................`...4...........4. ...(...............................................B...B.....................UPX!d...................\..........?.E.h;....#....%..R..nnxv$...T.......%.+....(.hyB....W..] ..8n...u.>...:<....`]j..U..p..aL..........

                    ELF header

                    Class:ELF32
                    Data:2's complement, little endian
                    Version:1 (current)
                    Machine:MIPS R3000
                    Version Number:0x1
                    Type:EXEC (Executable file)
                    OS/ABI:UNIX - System V
                    ABI Version:0
                    Entry Point Address:0x109560
                    Flags:0x1007
                    ELF Header Size:52
                    Program Header Offset:52
                    Program Header Size:32
                    Number of Program Headers:2
                    Section Header Offset:0
                    Section Header Size:40
                    Number of Section Headers:0
                    Header String Table Index:0
                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                    LOAD0x00x1000000x1000000xa89d0xa89d7.94490x5R E0x10000
                    LOAD0xdbe00x42dbe00x42dbe00x00x00.00000x6RW 0x10000

                    Download Network PCAP: filteredfull

                    • Total Packets: 18
                    • 18129 undefined
                    • 53 (DNS)
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 23, 2025 22:32:41.665529966 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:32:41.868685007 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:32:41.868741989 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:32:41.870064974 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:32:42.071119070 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:32:42.071151018 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:32:42.267839909 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:32:51.880350113 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:32:52.086366892 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:32:52.086390972 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:32:52.086453915 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:32:53.062547922 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:32:53.062608957 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:33:08.349495888 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:33:08.349555969 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:33:23.552155972 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:33:23.552283049 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:33:38.768198967 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:33:38.768397093 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:33:53.110888004 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:33:53.312644958 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:33:53.313286066 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:33:54.069885969 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:33:54.070195913 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:34:09.303678036 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:34:09.303855896 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:34:24.508397102 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:34:24.508613110 CET3363218129192.168.2.13193.32.162.27
                    Mar 23, 2025 22:34:39.713798046 CET1812933632193.32.162.27192.168.2.13
                    Mar 23, 2025 22:34:39.713959932 CET3363218129192.168.2.13193.32.162.27
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 23, 2025 22:32:44.163764954 CET4829753192.168.2.131.1.1.1
                    Mar 23, 2025 22:32:44.163840055 CET5271453192.168.2.131.1.1.1
                    Mar 23, 2025 22:32:44.261435032 CET53482971.1.1.1192.168.2.13
                    Mar 23, 2025 22:32:44.262156010 CET53527141.1.1.1192.168.2.13
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Mar 23, 2025 22:32:44.163764954 CET192.168.2.131.1.1.10xef22Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                    Mar 23, 2025 22:32:44.163840055 CET192.168.2.131.1.1.10x5ce4Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Mar 23, 2025 22:32:44.261435032 CET1.1.1.1192.168.2.130xef22No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                    Mar 23, 2025 22:32:44.261435032 CET1.1.1.1192.168.2.130xef22No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                    System Behavior

                    Start time (UTC):21:32:40
                    Start date (UTC):23/03/2025
                    Path:/tmp/pmpsl.elf
                    Arguments:/tmp/pmpsl.elf
                    File size:5773336 bytes
                    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                    Start time (UTC):21:32:40
                    Start date (UTC):23/03/2025
                    Path:/tmp/pmpsl.elf
                    Arguments:-
                    File size:5773336 bytes
                    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                    Start time (UTC):21:32:40
                    Start date (UTC):23/03/2025
                    Path:/tmp/pmpsl.elf
                    Arguments:-
                    File size:5773336 bytes
                    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                    Start time (UTC):21:32:40
                    Start date (UTC):23/03/2025
                    Path:/tmp/pmpsl.elf
                    Arguments:-
                    File size:5773336 bytes
                    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9