Edit tour

Linux Analysis Report
i686.elf

Overview

General Information

Sample name:i686.elf
Analysis ID:1650432
MD5:26977072c228bf1c09f4612b72f0f57c
SHA1:908ad9f10d9e48e6086de4d4d2d01d50f0974dbc
SHA256:aab122e82966d0d72d2464c6b8e483ca731d69eb088c139cc1a3b8883dcb1609
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1650432
Start date and time:2025-03-27 18:02:26 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 15s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:i686.elf
Detection:MAL
Classification:mal56.linELF@0/0@0/0
Command:/tmp/i686.elf
PID:5426
Exit Code:1
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • i686.elf (PID: 5426, Parent: 5347, MD5: 26977072c228bf1c09f4612b72f0f57c) Arguments: /tmp/i686.elf
  • dash New Fork (PID: 5466, Parent: 3589)
  • rm (PID: 5466, Parent: 3589, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.Hb7206rUNV /tmp/tmp.1uzzn99q0i /tmp/tmp.HLaMj5jSUu
  • dash New Fork (PID: 5467, Parent: 3589)
  • rm (PID: 5467, Parent: 3589, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.Hb7206rUNV /tmp/tmp.1uzzn99q0i /tmp/tmp.HLaMj5jSUu
  • cleanup
SourceRuleDescriptionAuthorStrings
i686.elfLinux_Trojan_Mirai_268aac0bunknownunknown
  • 0x1b1f:$a: 24 18 0F B7 44 24 20 8B 54 24 1C 83 F9 01 8B 7E 0C 89 04 24 8B
i686.elfLinux_Trojan_Mirai_0cb1699cunknownunknown
  • 0x1ad2:$a: DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 10 0F B7 02 83 E9 02 83
i686.elfLinux_Trojan_Mirai_0d73971cunknownunknown
  • 0x4ee2:$a: 89 C2 83 EB 04 C1 E2 0B 31 C2 89 F0 C1 E8 13 89 D1 31 F0 C1
i686.elfLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x7148:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
SourceRuleDescriptionAuthorStrings
5426.1.0000000008048000.0000000008053000.r-x.sdmpLinux_Trojan_Mirai_268aac0bunknownunknown
  • 0x1b1f:$a: 24 18 0F B7 44 24 20 8B 54 24 1C 83 F9 01 8B 7E 0C 89 04 24 8B
5426.1.0000000008048000.0000000008053000.r-x.sdmpLinux_Trojan_Mirai_0cb1699cunknownunknown
  • 0x1ad2:$a: DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 10 0F B7 02 83 E9 02 83
5426.1.0000000008048000.0000000008053000.r-x.sdmpLinux_Trojan_Mirai_0d73971cunknownunknown
  • 0x4ee2:$a: 89 C2 83 EB 04 C1 E2 0B 31 C2 89 F0 C1 E8 13 89 D1 31 F0 C1
5426.1.0000000008048000.0000000008053000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x7148:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: i686.elfVirustotal: Detection: 7%Perma Link
Source: i686.elfReversingLabs: Detection: 13%
Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57214
Source: unknownNetwork traffic detected: HTTP traffic on port 57214 -> 443

System Summary

barindex
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_268aac0b Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_0cb1699c Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_0d73971c Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5426.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_268aac0b Author: unknown
Source: 5426.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_0cb1699c Author: unknown
Source: 5426.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_0d73971c Author: unknown
Source: 5426.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_268aac0b reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 9c581721bf82af7dc6482a2c41af5fb3404e01c82545c7b2b29230f707014781, id = 268aac0b-c5c7-4035-8381-4e182de91e32, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_0cb1699c reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6e44c68bba8c9fb53ac85080b9ad765579f027cabfea5055a0bb3a85b8671089, id = 0cb1699c-9a08-4885-aa7f-0f1ee2543cac, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_0d73971c reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 95279bc45936ca867efb30040354c8ff81de31dccda051cfd40b4fb268c228c5, id = 0d73971c-4253-4e7d-b1e1-20b031197f9e, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5426.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_268aac0b reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 9c581721bf82af7dc6482a2c41af5fb3404e01c82545c7b2b29230f707014781, id = 268aac0b-c5c7-4035-8381-4e182de91e32, last_modified = 2021-09-16
Source: 5426.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_0cb1699c reference_sample = fc8741f67f39e7409ab2c6c62d4f9acdd168d3e53cf6976dd87501833771cacb, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6e44c68bba8c9fb53ac85080b9ad765579f027cabfea5055a0bb3a85b8671089, id = 0cb1699c-9a08-4885-aa7f-0f1ee2543cac, last_modified = 2021-09-16
Source: 5426.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_0d73971c reference_sample = 49c94d184d7e387c3efe34ae6f021e011c3046ae631c9733ab0a230d5fe28ead, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 95279bc45936ca867efb30040354c8ff81de31dccda051cfd40b4fb268c228c5, id = 0d73971c-4253-4e7d-b1e1-20b031197f9e, last_modified = 2021-09-16
Source: 5426.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: classification engineClassification label: mal56.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 5466)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Hb7206rUNV /tmp/tmp.1uzzn99q0i /tmp/tmp.HLaMj5jSUuJump to behavior
Source: /usr/bin/dash (PID: 5467)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Hb7206rUNV /tmp/tmp.1uzzn99q0i /tmp/tmp.HLaMj5jSUuJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1650432 Sample: i686.elf Startdate: 27/03/2025 Architecture: LINUX Score: 56 12 54.247.62.1, 443, 57214 AMAZON-02US United States 2->12 14 Malicious sample detected (through community Yara rule) 2->14 16 Multi AV Scanner detection for submitted file 2->16 6 dash rm 2->6         started        8 dash rm 2->8         started        10 i686.elf 2->10         started        signatures3 process4
SourceDetectionScannerLabelLink
i686.elf8%VirustotalBrowse
i686.elf14%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
54.247.62.1
unknownUnited States
16509AMAZON-02USfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
54.247.62.1na.elfGet hashmaliciousPrometeiBrowse
    SecuriteInfo.com.Linux.Mirai.4306.30063.19032.elfGet hashmaliciousUnknownBrowse
      na.elfGet hashmaliciousPrometeiBrowse
        hanoi.arm.elfGet hashmaliciousUnknownBrowse
          resgod.arm5.elfGet hashmaliciousMiraiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              morte.spc.elfGet hashmaliciousUnknownBrowse
                main_m68k.elfGet hashmaliciousMiraiBrowse
                  na.elfGet hashmaliciousPrometeiBrowse
                    mips.elfGet hashmaliciousMiraiBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                      • 54.170.242.139
                      http://loginmlcrosoftonline365aftral.com.ribeiroautocapas.com.br/cgi-bin/reset/authorize?email=maurice@microsoft.comGet hashmaliciousHTMLPhisherBrowse
                      • 18.238.80.7
                      na.elfGet hashmaliciousPrometeiBrowse
                      • 34.249.145.219
                      na.elfGet hashmaliciousPrometeiBrowse
                      • 54.170.242.139
                      arm.elfGet hashmaliciousUnknownBrowse
                      • 34.249.145.219
                      arm5.elfGet hashmaliciousUnknownBrowse
                      • 34.249.145.219
                      na.elfGet hashmaliciousPrometeiBrowse
                      • 34.249.145.219
                      na.elfGet hashmaliciousPrometeiBrowse
                      • 54.170.242.139
                      na.elfGet hashmaliciousPrometeiBrowse
                      • 54.170.242.139
                      https://www.transfernow.net/dl/20250327nEx48coZGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                      • 13.35.93.28
                      No context
                      No context
                      No created / dropped files found
                      File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                      Entropy (8bit):6.29781339900147
                      TrID:
                      • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                      • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                      File name:i686.elf
                      File size:43'472 bytes
                      MD5:26977072c228bf1c09f4612b72f0f57c
                      SHA1:908ad9f10d9e48e6086de4d4d2d01d50f0974dbc
                      SHA256:aab122e82966d0d72d2464c6b8e483ca731d69eb088c139cc1a3b8883dcb1609
                      SHA512:28e43067f04e39dc9f3f4d1ffb2702f8bc25bdad3fc18646d6831aa59fc89fe8edddfb927da97d1e446d226194710fa431bf8d0155612dac2046209374a51895
                      SSDEEP:768:e5xKGqqq7Y5TiJjanBnHx8vOWE0+3Edqhcszoap/2u:SKM5TiJGnBnGb+UdNszXpd
                      TLSH:B1130780F84389F9E84748B89497F33FAB31D9446134A22EEF89DB3AD623685571734D
                      File Content Preview:.ELF....................h...4...@.......4. ...(..............................................6...6......<...........Q.td............................U..S.......{....h........[]...$.............U......=.8...t..1....D6.....D6......u........t...$.&..........8

                      ELF header

                      Class:ELF32
                      Data:2's complement, little endian
                      Version:1 (current)
                      Machine:Intel 80386
                      Version Number:0x1
                      Type:EXEC (Executable file)
                      OS/ABI:UNIX - System V
                      ABI Version:0
                      Entry Point Address:0x8048168
                      Flags:0x0
                      ELF Header Size:52
                      Program Header Offset:52
                      Program Header Size:32
                      Number of Program Headers:3
                      Section Header Offset:43072
                      Section Header Size:40
                      Number of Section Headers:10
                      Header String Table Index:9
                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                      NULL0x00x00x00x00x0000
                      .initPROGBITS0x80480940x940x1c0x00x6AX001
                      .textPROGBITS0x80480b00xb00x97b10x00x6AX0016
                      .finiPROGBITS0x80518610x98610x170x00x6AX001
                      .rodataPROGBITS0x80518800x98800xd800x00x2A0032
                      .ctorsPROGBITS0x80536040xa6040x80x00x3WA004
                      .dtorsPROGBITS0x805360c0xa60c0x80x00x3WA004
                      .dataPROGBITS0x80536400xa6400x1c00x00x3WA0032
                      .bssNOBITS0x80538000xa8000x17400x00x3WA0032
                      .shstrtabSTRTAB0x00xa8000x3e0x00x0001
                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                      LOAD0x00x80480000x80480000xa6000xa6006.32430x5R E0x1000.init .text .fini .rodata
                      LOAD0xa6040x80536040x80536040x1fc0x193c4.71070x6RW 0x1000.ctors .dtors .data .bss
                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                      Download Network PCAP: filteredfull

                      TimestampSource PortDest PortSource IPDest IP
                      Mar 27, 2025 18:03:13.313229084 CET57214443192.168.2.1354.247.62.1
                      Mar 27, 2025 18:03:34.717402935 CET57214443192.168.2.1354.247.62.1
                      Mar 27, 2025 18:03:34.901989937 CET4435721454.247.62.1192.168.2.13

                      System Behavior

                      Start time (UTC):17:03:06
                      Start date (UTC):27/03/2025
                      Path:/tmp/i686.elf
                      Arguments:/tmp/i686.elf
                      File size:43472 bytes
                      MD5 hash:26977072c228bf1c09f4612b72f0f57c
                      Start time (UTC):17:03:34
                      Start date (UTC):27/03/2025
                      Path:/usr/bin/dash
                      Arguments:-
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      Start time (UTC):17:03:34
                      Start date (UTC):27/03/2025
                      Path:/usr/bin/rm
                      Arguments:rm -f /tmp/tmp.Hb7206rUNV /tmp/tmp.1uzzn99q0i /tmp/tmp.HLaMj5jSUu
                      File size:72056 bytes
                      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                      Start time (UTC):17:03:34
                      Start date (UTC):27/03/2025
                      Path:/usr/bin/dash
                      Arguments:-
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      Start time (UTC):17:03:34
                      Start date (UTC):27/03/2025
                      Path:/usr/bin/rm
                      Arguments:rm -f /tmp/tmp.Hb7206rUNV /tmp/tmp.1uzzn99q0i /tmp/tmp.HLaMj5jSUu
                      File size:72056 bytes
                      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b