Edit tour

Linux Analysis Report
libc++_shared.so

Overview

General Information

Sample name:libc++_shared.so
Analysis ID:1673372
MD5:0f192b1a8e6c7677916318a4414a1301
SHA1:1ee477299947129157dc5f5d478851ee9e8235ed
SHA256:dfdbbc6d633d7d7734271ee3b7a288976393ec0ec38f1fedc99360f266ad5279
Infos:

Detection

Score:0
Range:0 - 100

Signatures

Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1673372
Start date and time:2025-04-24 19:15:37 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 10m 14s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:libc++_shared.so
Detection:CLEAN
Classification:clean0.linSO@0/0@2/0
Cookbook Comments:
  • Analysis time extended to 480s due to sleep detection in submitted sample
Command:/tmp/libc++_shared.so
PID:5432
Exit Code:132
Exit Code Info:SIGILL (4) Illegal Instruction
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 4 (Illegal instruction) - core dumped
  • system is lnxubuntu20
  • libc++_shared.so (PID: 5432, Parent: 5355, MD5: 02e8e39e1b46472a60d128a6da84a2b8) Arguments: /tmp/libc++_shared.so
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: libc++_shared.soString found in binary or memory: https://android.googlesource.com/toolchain/llvm-project
Source: classification engineClassification label: clean0.linSO@0/0@2/0
Source: /tmp/libc++_shared.so (PID: 5432)Queries kernel information via 'uname': Jump to behavior
Source: libc++_shared.so, 5432.1.0000563623bd8000.0000563623c9d000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/aarch64
Source: libc++_shared.so, 5432.1.0000563623bd8000.0000563623c9d000.rw-.sdmpBinary or memory string: #6V1/etc/qemu-binfmt/aarch64O
Source: libc++_shared.so, 5432.1.00007ffced41c000.00007ffced43d000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-aarch64/tmp/libc++_shared.soSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/libc++_shared.so
Source: libc++_shared.so, 5432.1.00007ffced41c000.00007ffced43d000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 4 (Illegal instruction) - core dumped
Source: libc++_shared.so, 5432.1.00007ffced41c000.00007ffced43d000.rw-.sdmpBinary or memory string: /usr/bin/qemu-aarch64
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1673372 Sample: libc++_shared.so Startdate: 24/04/2025 Architecture: LINUX Score: 0 7 daisy.ubuntu.com 2->7 5 libc++_shared.so 2->5         started        process3
SourceDetectionScannerLabelLink
libc++_shared.so0%VirustotalBrowse
libc++_shared.so0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://android.googlesource.com/toolchain/llvm-projectlibc++_shared.sofalse
      high
      No contacted IP infos
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      daisy.ubuntu.compython.elfGet hashmaliciousXmrigBrowse
      • 162.213.35.25
      python3.6.3.elfGet hashmaliciousXmrigBrowse
      • 162.213.35.25
      hanoi.x86_64.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      S95baby.sh.elfGet hashmaliciousUnknownBrowse
      • 162.213.35.25
      ceph-mgr-dashboard-15.2.17-0.el7.noarch.rpmGet hashmaliciousUnknownBrowse
      • 162.213.35.25
      bin.sh.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      tftp.elfGet hashmaliciousUnknownBrowse
      • 162.213.35.24
      hanoi.x86_64.elfGet hashmaliciousUnknownBrowse
      • 162.213.35.24
      arm5.elfGet hashmaliciousUnknownBrowse
      • 162.213.35.24
      arm6.elfGet hashmaliciousGafgytBrowse
      • 162.213.35.24
      No context
      No context
      No context
      No created / dropped files found
      File type:ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=a59088f9640cd272bc9542d94dc84a0c88afd558, stripped
      Entropy (8bit):6.0729140422067704
      TrID:
      • ELF Executable and Linkable format (Linux) (4029/14) 49.77%
      • ELF Executable and Linkable format (generic) (4004/1) 49.46%
      • Lumena CEL bitmap (63/63) 0.78%
      File name:libc++_shared.so
      File size:1'026'616 bytes
      MD5:0f192b1a8e6c7677916318a4414a1301
      SHA1:1ee477299947129157dc5f5d478851ee9e8235ed
      SHA256:dfdbbc6d633d7d7734271ee3b7a288976393ec0ec38f1fedc99360f266ad5279
      SHA512:36e2a224238dd8db7edbcacb5579fe55b2749bf7c4e51800e8096a36aa4d1ba20f166e7d6d98b895ab3806b5ebbc43bbc535c9cdbd18a46a95f38341a5569712
      SSDEEP:12288:I/MdZJ+CoZS2zFryUt+sLmADXeW4u73dlTm4Autap74FRg:ldZJ+CoZS2zFOaiW4uXu4FRg
      TLSH:1D256E01EF0E5D26CBC5B9BD868313E1A1127CAC2624C9DF2913C11DFE97AD59E227D2
      File Content Preview:.ELF............................@.......8...........@.8...@.............@.......@.......@.......h.......h........................................................................................(.......(......x.......x.......................H.......H......

      Download Network PCAP: filteredfull

      TimestampSource PortDest PortSource IPDest IP
      Apr 24, 2025 19:16:16.317492008 CEST4726653192.168.2.131.1.1.1
      Apr 24, 2025 19:16:16.317492008 CEST5061153192.168.2.131.1.1.1
      Apr 24, 2025 19:16:16.458663940 CEST53472661.1.1.1192.168.2.13
      Apr 24, 2025 19:16:16.491163969 CEST53506111.1.1.1192.168.2.13
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 24, 2025 19:16:16.317492008 CEST192.168.2.131.1.1.10xfd48Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
      Apr 24, 2025 19:16:16.317492008 CEST192.168.2.131.1.1.10xff2cStandard query (0)daisy.ubuntu.com28IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 24, 2025 19:16:16.458663940 CEST1.1.1.1192.168.2.130xfd48No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
      Apr 24, 2025 19:16:16.458663940 CEST1.1.1.1192.168.2.130xfd48No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

      System Behavior

      Start time (UTC):17:16:14
      Start date (UTC):24/04/2025
      Path:/tmp/libc++_shared.so
      Arguments:/tmp/libc++_shared.so
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8