Edit tour

Linux Analysis Report
Aqua.mips.elf

Overview

General Information

Sample name:Aqua.mips.elf
Analysis ID:1649589
MD5:fa343b55a035ec979f545e97986f01d8
SHA1:526c716ea09e3d65a5272c88a4fc37a46099cb17
SHA256:d4929acb602dfb610d7c016a3f2db312433dca5eefeb36c12da77e7baaf37559
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1649589
Start date and time:2025-03-26 23:23:23 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Aqua.mips.elf
Detection:MAL
Classification:mal60.evad.linELF@0/4@4/0
Command:/tmp/Aqua.mips.elf
PID:5528
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
kovey/cursinq was here, go away!
Standard Error:
  • system is lnxubuntu20
  • Aqua.mips.elf (PID: 5528, Parent: 5446, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/Aqua.mips.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Aqua.mips.elfAvira: detected
Source: Aqua.mips.elfReversingLabs: Detection: 44%
Source: global trafficTCP traffic: 192.168.2.15:46862 -> 141.98.10.142:2211
Source: global trafficDNS traffic detected: DNS query: raw.awaken-network.net
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal60.evad.linELF@0/4@4/0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/Aqua.mips.elf (PID: 5530)File: /tmp/Aqua.mips.elfJump to behavior
Source: /tmp/Aqua.mips.elf (PID: 5528)Queries kernel information via 'uname': Jump to behavior
Source: Aqua.mips.elf, 5528.1.000055fd3548b000.000055fd35512000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mips
Source: Aqua.mips.elf, 5528.1.000055fd3548b000.000055fd35512000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
Source: Aqua.mips.elf, 5528.1.00007ffd54e94000.00007ffd54eb5000.rw-.sdmpBinary or memory string: %s/qemu-op
Source: Aqua.mips.elf, 5528.1.00007ffd54e94000.00007ffd54eb5000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
Source: Aqua.mips.elf, 5528.1.00007ffd54e94000.00007ffd54eb5000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.ZVhXNc\T
Source: Aqua.mips.elf, 5528.1.00007ffd54e94000.00007ffd54eb5000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/Aqua.mips.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Aqua.mips.elf
Source: Aqua.mips.elf, 5528.1.00007ffd54e94000.00007ffd54eb5000.rw-.sdmpBinary or memory string: /tmp/qemu-open.ZVhXNc
Source: Aqua.mips.elf, 5528.1.00007ffd54e94000.00007ffd54eb5000.rw-.sdmpBinary or memory string: MPDIR%s/qemu-op
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1649589 Sample: Aqua.mips.elf Startdate: 26/03/2025 Architecture: LINUX Score: 60 12 raw.awaken-network.net 141.98.10.142, 2211, 46862, 46864 HOSTBALTICLT Lithuania 2->12 14 Antivirus / Scanner detection for submitted sample 2->14 16 Multi AV Scanner detection for submitted file 2->16 7 Aqua.mips.elf 2->7         started        signatures3 process4 process5 9 Aqua.mips.elf 7->9         started        signatures6 18 Sample deletes itself 9->18

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Aqua.mips.elf44%ReversingLabsLinux.Trojan.Mirai
Aqua.mips.elf100%AviraEXP/ELF.Agent.J.8
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
raw.awaken-network.net
141.98.10.142
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    141.98.10.142
    raw.awaken-network.netLithuania
    209605HOSTBALTICLTfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    141.98.10.142eehah4.elfGet hashmaliciousUnknownBrowse
      rrrdsl.elfGet hashmaliciousUnknownBrowse
        bejv86.elfGet hashmaliciousUnknownBrowse
          weje64.elfGet hashmaliciousUnknownBrowse
            vejfa5.elfGet hashmaliciousUnknownBrowse
              jfeeps.elfGet hashmaliciousUnknownBrowse
                efefa7.elfGet hashmaliciousMiraiBrowse
                  efjepc.elfGet hashmaliciousUnknownBrowse
                    vejfa5.elfGet hashmaliciousUnknownBrowse
                      efefa7.elfGet hashmaliciousMiraiBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        raw.awaken-network.netrrrdsl.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        weje64.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        jfeeps.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        efjepc.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        HOSTBALTICLTeehah4.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        rrrdsl.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        bejv86.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        weje64.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        vejfa5.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        jfeeps.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        efefa7.elfGet hashmaliciousMiraiBrowse
                        • 141.98.10.142
                        efjepc.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        vejfa5.elfGet hashmaliciousUnknownBrowse
                        • 141.98.10.142
                        efefa7.elfGet hashmaliciousMiraiBrowse
                        • 141.98.10.142
                        No context
                        No context
                        Process:/tmp/Aqua.mips.elf
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:I:I
                        MD5:336D5EBC5436534E61D16E63DDFCA327
                        SHA1:3BC15C8AAE3E4124DD409035F32EA2FD6835EFC9
                        SHA-256:3973E022E93220F9212C18D0D0C543AE7C309E46640DA93A4A0314DE999F5112
                        SHA-512:7C0B0D99A6E4C33CDA0F6F63547F878F4DD9F486DFE5D0446CE004B1C0FF28F191FF86F5D5933D3614CCEEE6FBBDC17E658881D3A164DFA5D6F4C699B2126E3D
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:-
                        Process:/tmp/Aqua.mips.elf
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):20
                        Entropy (8bit):3.8219280948873617
                        Encrypted:false
                        SSDEEP:3:TgHWCln:Tg2m
                        MD5:7C1C2A855F7346BEB3412DAC92CA29EB
                        SHA1:B0DAE3E8186B8040BF99333FABEEFA88104ECBEA
                        SHA-256:3109E2EEE33B8847B1DA4A378A40A21356F3197E8574EB963B9EFE8EE77D8A30
                        SHA-512:6F32B319F32B07A7C310DE48B63C81866393CCBBD5AE0AC2D49E475AFB430E779EEB2DDEA51B6AD1B536533C8D5A188AA01C61010513A9A7358BC8837F0361D5
                        Malicious:false
                        Reputation:low
                        Preview:/tmp/Aqua.mips.elf..
                        Process:/tmp/Aqua.mips.elf
                        File Type:data
                        Category:dropped
                        Size (bytes):29
                        Entropy (8bit):4.1852301329094015
                        Encrypted:false
                        SSDEEP:3:TgHWCL8HJN:Tg2BJN
                        MD5:5DE8DFDDC7FAB7288CAFB40F58749EFE
                        SHA1:E57A6BA66AE8E362D2683846F616A6693D95A81D
                        SHA-256:E8AEB1E3E141F734EC9A546B30945CF93CBCB58DBCB931216DCE3C1F467035B2
                        SHA-512:37F922569AEAEEB3DF5DBB21F0C9E91C41575A5B2CCBFC188DA1562F62F6499A7699FB0BE5476D4FF43267D96983A45740FE7C931A8AE9ACE5600F5B1DFE0635
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:/tmp/Aqua.mips.elf.nwlrbbmqbh
                        Process:/tmp/Aqua.mips.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):155
                        Entropy (8bit):2.6507616894286024
                        Encrypted:false
                        SSDEEP:3:FXHYRIgHWrVBdSRVFvve/FNvN:tH8Ig2rVWRVQ/1
                        MD5:4357E2850F800B67FCDC4673C2455AB4
                        SHA1:D1E9179A0E0D5BB648861F22A8DB343AF65111A9
                        SHA-256:E71F24F92A75BBC693B9A04637DE24CFDB43034AD71C3578F3B45B329619A2E2
                        SHA-512:F09C42DFE27B78C704A49411612A4B2CDB724C7A21F613B8C1319A685932B0440F17537E7DBA96F2D13D3F9432036D9B8CB0A01CB4C33717273A5733EFAC15A9
                        Malicious:false
                        Reputation:low
                        Preview:5528 (/tmp/Aqua.mips.elf) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2147483040 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0.- (0) S 0 0 0 0 0 0 0 0 0 0 0 0 0 0
                        File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):4.954997360837761
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:Aqua.mips.elf
                        File size:179'060 bytes
                        MD5:fa343b55a035ec979f545e97986f01d8
                        SHA1:526c716ea09e3d65a5272c88a4fc37a46099cb17
                        SHA256:d4929acb602dfb610d7c016a3f2db312433dca5eefeb36c12da77e7baaf37559
                        SHA512:6f16eacb55feb23ea961c0b5507faab16c7c0126e4a135d30c15d2f7cc8635e12152d496a7c8ecfb3d5f60b7c89f93fd0351b8272fe1e41e17c129a1dc875a11
                        SSDEEP:1536:1KzIpOSt3H1jlk2rzNR9ahG6Ea04hLjYeVmHbiUbCsTdHr5o+Ui2g2PO:PpOkpJahG1aHhHwHbAmlo+Ui2g2PO
                        TLSH:A504A71E6E228F7EF668C73147B74D209B5C33D616E1DA44E2ACC2105F6068E645FFA8
                        File Content Preview:.ELF.....................@.`...4...D.....4. ...(.............@...@....R@..R@..............`..F`..F`...X.............dt.Q............................<...'.-<...!'.......................<...'.-....!...$....'9... ......................<...'.,....!... ....'9+

                        ELF header

                        Class:ELF32
                        Data:2's complement, big endian
                        Version:1 (current)
                        Machine:MIPS R3000
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x400260
                        Flags:0x1007
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:178500
                        Section Header Size:40
                        Number of Section Headers:14
                        Header String Table Index:13
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x4000940x940x8c0x00x6AX004
                        .textPROGBITS0x4001200x1200x22b000x00x6AX0016
                        .finiPROGBITS0x422c200x22c200x5c0x00x6AX004
                        .rodataPROGBITS0x422c800x22c800x25c00x00x2A0016
                        .ctorsPROGBITS0x4660000x260000xc0x00x3WA004
                        .dtorsPROGBITS0x46600c0x2600c0x80x00x3WA004
                        .data.rel.roPROGBITS0x4660180x260180x4a00x00x3WA004
                        .dataPROGBITS0x4664c00x264c00x49200x00x3WA0032
                        .gotPROGBITS0x46ade00x2ade00xb000x40x10000003WAp0016
                        .sbssNOBITS0x46b8e00x2b8e00x500x00x10000003WAp004
                        .bssNOBITS0x46b9300x2b8e00x46b00x00x3WA0016
                        .mdebug.abi32PROGBITS0x139e0x2b8e00x00x00x0001
                        .shstrtabSTRTAB0x00x2b8e00x640x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x4000000x4000000x252400x252405.40620x5R E0x10000.init .text .fini .rodata
                        LOAD0x260000x4660000x4660000x58e00x9fe01.32640x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                        Download Network PCAP: filteredfull

                        • Total Packets: 20
                        • 2211 undefined
                        • 53 (DNS)
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 26, 2025 23:24:11.012428045 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:24:11.198084116 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:24:11.198322058 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:24:11.199667931 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:24:11.385358095 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:24:11.385576010 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:24:11.570776939 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:24:26.617046118 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:24:26.617434978 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:24:41.804734945 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:24:41.805088043 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:24:56.992937088 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:24:56.993371964 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:12.185400963 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:25:12.185683012 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:21.244390965 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:21.429882050 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:25:31.249958992 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:31.435626984 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:25:46.488864899 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:25:46.489301920 CET468622211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:55.794845104 CET221146862141.98.10.142192.168.2.15
                        Mar 26, 2025 23:25:56.977224112 CET468642211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:57.157947063 CET221146864141.98.10.142192.168.2.15
                        Mar 26, 2025 23:25:57.158282995 CET468642211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:57.160295010 CET468642211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:57.341192961 CET221146864141.98.10.142192.168.2.15
                        Mar 26, 2025 23:25:57.341605902 CET468642211192.168.2.15141.98.10.142
                        Mar 26, 2025 23:25:57.522438049 CET221146864141.98.10.142192.168.2.15
                        Mar 26, 2025 23:26:12.525871038 CET221146864141.98.10.142192.168.2.15
                        Mar 26, 2025 23:26:12.526114941 CET468642211192.168.2.15141.98.10.142
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 26, 2025 23:24:10.839607954 CET3983853192.168.2.158.8.8.8
                        Mar 26, 2025 23:24:10.924566984 CET53398388.8.8.8192.168.2.15
                        Mar 26, 2025 23:24:10.926469088 CET4811953192.168.2.158.8.8.8
                        Mar 26, 2025 23:24:11.011308908 CET53481198.8.8.8192.168.2.15
                        Mar 26, 2025 23:25:56.803594112 CET4250353192.168.2.158.8.8.8
                        Mar 26, 2025 23:25:56.888410091 CET53425038.8.8.8192.168.2.15
                        Mar 26, 2025 23:25:56.890816927 CET3744853192.168.2.158.8.8.8
                        Mar 26, 2025 23:25:56.975677013 CET53374488.8.8.8192.168.2.15
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Mar 26, 2025 23:24:10.839607954 CET192.168.2.158.8.8.80x8f9eStandard query (0)raw.awaken-network.netA (IP address)IN (0x0001)false
                        Mar 26, 2025 23:24:10.926469088 CET192.168.2.158.8.8.80x299aStandard query (0)raw.awaken-network.netA (IP address)IN (0x0001)false
                        Mar 26, 2025 23:25:56.803594112 CET192.168.2.158.8.8.80x12bStandard query (0)raw.awaken-network.netA (IP address)IN (0x0001)false
                        Mar 26, 2025 23:25:56.890816927 CET192.168.2.158.8.8.80x540eStandard query (0)raw.awaken-network.netA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Mar 26, 2025 23:24:10.924566984 CET8.8.8.8192.168.2.150x8f9eNo error (0)raw.awaken-network.net141.98.10.142A (IP address)IN (0x0001)false
                        Mar 26, 2025 23:24:11.011308908 CET8.8.8.8192.168.2.150x299aNo error (0)raw.awaken-network.net141.98.10.142A (IP address)IN (0x0001)false
                        Mar 26, 2025 23:25:56.888410091 CET8.8.8.8192.168.2.150x12bNo error (0)raw.awaken-network.net141.98.10.142A (IP address)IN (0x0001)false
                        Mar 26, 2025 23:25:56.975677013 CET8.8.8.8192.168.2.150x540eNo error (0)raw.awaken-network.net141.98.10.142A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):22:24:10
                        Start date (UTC):26/03/2025
                        Path:/tmp/Aqua.mips.elf
                        Arguments:/tmp/Aqua.mips.elf
                        File size:5777432 bytes
                        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                        Start time (UTC):22:24:10
                        Start date (UTC):26/03/2025
                        Path:/tmp/Aqua.mips.elf
                        Arguments:-
                        File size:5777432 bytes
                        MD5 hash:0083f1f0e77be34ad27f849842bbb00c