Linux
Analysis Report
gigab.i686.elf
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara signature match
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1646466 |
Start date and time: | 2025-03-24 02:48:18 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 18s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | gigab.i686.elf |
Detection: | MAL |
Classification: | mal56.linELF@0/0@2/0 |
Command: | /tmp/gigab.i686.elf |
PID: | 5405 |
Exit Code: | 139 |
Exit Code Info: | SIGSEGV (11) Segmentation fault invalid memory reference |
Killed: | False |
Standard Output: | |
Standard Error: |
- system is lnxubuntu20
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Gafgyt_e6d75e6f | unknown | unknown |
| |
Linux_Trojan_Gafgyt_862c4e0e | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Gafgyt_e6d75e6f | unknown | unknown |
| |
Linux_Trojan_Gafgyt_862c4e0e | unknown | unknown |
|
⊘No Suricata rule has matched
- • AV Detection
- • Networking
- • System Summary
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | DNS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Direct Volume Access | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Non-Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
36% | ReversingLabs | Linux.Backdoor.DarkDDoSer |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
daisy.ubuntu.com | 162.213.35.25 | true | false | high |
⊘No contacted IP infos
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
daisy.ubuntu.com | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.310722877691134 |
TrID: |
|
File name: | gigab.i686.elf |
File size: | 63'448 bytes |
MD5: | f2837a9e282c5d88892566d535ccf67d |
SHA1: | 1f78556a2144651106b89bb3966da228144fc530 |
SHA256: | ba5576afa931b157691a9d1eaf9cd7cf2bc933613d369a2ec223e29e221298e7 |
SHA512: | 511c1a24fe4d34a7f3f0843c8b06c638b68f8618909024b036e85f6ec39c00d9783cbd187103ef0592427d218b6937678c022783520e8a3edcccb5d147d39b18 |
SSDEEP: | 1536:5fltsQYtCZPy/tAY07DWrcUCfdePtNZC:9oQYtC4/6Y07Dvpde1NZ |
TLSH: | FC535D85F383C1F6E80709730067A36F5337F62A4465DA5AE39D6D28F917820664B3AA |
File Content Preview: | .ELF........................4...d.......4. ...(.....................t...t....................p...p.......y..............p...pv..pv..................Q.td............................U..S............h........[]...$.............U......=.x...t..1.....v......v. |
Download Network PCAP: filtered – full
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 24, 2025 02:49:05.486833096 CET | 47212 | 53 | 192.168.2.13 | 8.8.8.8 |
Mar 24, 2025 02:49:05.486881971 CET | 41874 | 53 | 192.168.2.13 | 8.8.8.8 |
Mar 24, 2025 02:49:05.576921940 CET | 53 | 47212 | 8.8.8.8 | 192.168.2.13 |
Mar 24, 2025 02:49:05.577594042 CET | 53 | 41874 | 8.8.8.8 | 192.168.2.13 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 24, 2025 02:49:05.486833096 CET | 192.168.2.13 | 8.8.8.8 | 0xf477 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 02:49:05.486881971 CET | 192.168.2.13 | 8.8.8.8 | 0xb2e3 | Standard query (0) | 28 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 24, 2025 02:49:05.576921940 CET | 8.8.8.8 | 192.168.2.13 | 0xf477 | No error (0) | 162.213.35.25 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 02:49:05.576921940 CET | 8.8.8.8 | 192.168.2.13 | 0xf477 | No error (0) | 162.213.35.24 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 01:49:04 |
Start date (UTC): | 24/03/2025 |
Path: | /tmp/gigab.i686.elf |
Arguments: | /tmp/gigab.i686.elf |
File size: | 63448 bytes |
MD5 hash: | f2837a9e282c5d88892566d535ccf67d |