Linux
Analysis Report
extracted_elf_1.bin
Overview
General Information
Sample name: | extracted_elf_1.bin |
Analysis ID: | 1670410 |
MD5: | 23c6494a9e3c1b27bfbafb2b5206bfbe |
SHA1: | bce7519c346c76d845ddea50367b77563dc6f48f |
SHA256: | a064d53a8f1cc46be0a622b45cabc656c342624b005a4844d3c53bc42b4e46cc |
Infos: |
Detection
Score: | 1 |
Range: | 0 - 100 |
Signatures
Creates hidden files and/or directories
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1670410 |
Start date and time: | 2025-04-21 17:50:54 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 88.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171) |
Analysis Mode: | default |
Sample name: | extracted_elf_1.bin |
Detection: | CLEAN |
Classification: | clean1.linBIN@0/2@0/0 |
Command: | /tmp/extracted_elf_1.bin |
PID: | 4743 |
Exit Code: | 139 |
Exit Code Info: | SIGSEGV (11) Segmentation fault invalid memory reference |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 11 (Segmentation fault) - core dumped |
⊘No yara matches
⊘No Suricata rule has matched
- • System Summary
- • Persistence and Installation Behavior
- • Malware Analysis System Evasion
Click to jump to signature section
Show All Signature Results
There are no malicious signatures, click here to show all signatures.
Source: | Classification label: |
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |