Linux Analysis Report Mozi.m
Overview
General Information
Sample Name: | Mozi.m |
Analysis ID: | 453881 |
MD5: | cebe20a3e4eb38e9e37b995cf0d8f749 |
SHA1: | d1067600848180da20cc89930cac6da18c1ca213 |
SHA256: | db1b04ed7776bef94dbd281789c49ec4830354006f491eeb0e4c8690d7f8e5f9 |
Infos: |
Detection
Mirai
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Mirai
Yara detected Mirai
Sample is packed with UPX
Sample contains only a LOAD segment without any section mappings
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are potentially command strings
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Classification
Analysis Advice |
---|
Non-zero exit code suggests an error during the execution. Lookup the error code for hints. |
Static ELF header machine description suggests that the sample might not execute correctly on this machine |
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 453881 |
Start date: | 25.07.2021 |
Start time: | 13:04:29 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | Mozi.m |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal76.troj.evad.linM@0/2@0/0 |
Warnings: | Show All
|
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_ELF_LNX_UPX_Compressed_File | Detects a suspicious ELF binary with UPX compression | Florian Roth |
| |
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_6 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_4 | Yara detected Mirai | Joe Security |
Jbx Signature Overview |
---|
- • AV Detection
- • Networking
- • System Summary
- • Data Obfuscation
- • Malware Analysis System Evasion
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Program segment: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: |
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation: |
---|
Sample is packed with UPX |
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Source: | Queries kernel information via 'uname': | ||
Source: | Queries kernel information via 'uname': | ||
Source: | Queries kernel information via 'uname': |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Command and Scripting Interpreter1 | Path Interception | Path Interception | Obfuscated Files or Information1 | OS Credential Dumping | Security Software Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Malware Configuration |
---|
No configs have been found |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
48% | Virustotal | Browse | ||
39% | ReversingLabs | Linux.Trojan.Skeeyah |
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
No contacted domains info |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| low | ||
false |
| low | ||
true |
| low | ||
false | high | |||
false | high | |||
true |
| low | ||
false |
| unknown | ||
true |
| low | ||
true |
| low | ||
false | high |
No contacted IP infos |
---|
Command: | /tmp/Mozi.m |
Exit Code: | 133 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 5 (Trace/breakpoint trap) - core dumped |
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | /usr/share/apport/apport-checkreports |
File Type: | |
Category: | dropped |
Size (bytes): | 14915 |
Entropy (8bit): | 4.70703941891471 |
Encrypted: | false |
SSDEEP: | 96:mUSUM1S0oLf2NP3CEdU5NAnaMHdMXgIudNPKn/4EJdsPILd4YXrM:mUdONP3CEdKgIuE/4EbsPIhhbM |
MD5: | 409B9FEF1D6A919E61A71A3F7C7700E9 |
SHA1: | D6E4DD4CA6129CF522AF9026C29BBF9B3C30A63A |
SHA-256: | 7BEEF722D67598D7AD747DC73EB5F659C81306A9CAD3FEA3D9804436BB0F6126 |
SHA-512: | 43FB8F0DEFBC735B9DA18D40053A8A586FD25848210F1A0EDC98CED1449F8EB2562DA80D88956CF8D92897A1B1CE2DCF24BAE0CACCA183AFD4246708F0A81FC8 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | /usr/share/apport/apport-gtk |
File Type: | |
Category: | dropped |
Size (bytes): | 47094 |
Entropy (8bit): | 4.499624441689966 |
Encrypted: | false |
SSDEEP: | 384:mi9QQ6p1mNoiXZqA/B/m/7/LfJiZC7rJeNAPfUFObYIUioqRxLUeUZFEpF:PqA/B/m/7/IZCXaAPnYSoqRxQeUZFA |
MD5: | 444D97F3166D74AB937C2CE982EAE6DC |
SHA1: | 46EA5BDA0D999D1CED9B334C4BED0DCAF750B88D |
SHA-256: | B039E88B63E1BD68BE452528A1484858B618B6DE383FF7EDF1A2D08C797CD473 |
SHA-512: | CC77E11A6A2CF62DC87386826CDBED7ED7F48B2E20F44AC6E9EE0D68AF4F44126A87B849B44F7286200436D23A88C32C473E9AB2395E0B8FA03F8D7D9D709156 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 4.9371152282277 |
TrID: |
|
File name: | Mozi.m |
File size: | 307960 |
MD5: | cebe20a3e4eb38e9e37b995cf0d8f749 |
SHA1: | d1067600848180da20cc89930cac6da18c1ca213 |
SHA256: | db1b04ed7776bef94dbd281789c49ec4830354006f491eeb0e4c8690d7f8e5f9 |
SHA512: | 683cd490acbbcd37673f37e1b98f66d2de4af6372cba220a52ff643fe94607b614990e987e24abbd9ad9ed6d2bfcd53a76b4022859f0cac7adebb82254417773 |
SSDEEP: | 3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xioo3Q:p3lOYoaja8xzx/0wsxzSiA |
File Content Preview: | .ELF.....................B.....4.........4. ...(.............@...@...........................C...C......../..........*.*UPX!.X.....................^....|.$..ELF..........@.`....4...0... ...(......<...@......[v......H...`.t..;_...dt.Q.....].M.............. |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | |
Entry Point Address: | |
Flags: | |
ELF Header Size: | |
Program Header Offset: | |
Program Header Size: | |
Number of Program Headers: | |
Section Header Offset: | |
Section Header Size: | |
Number of Section Headers: | |
Header String Table Index: |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x400000 | 0x400000 | 0x210f2 | 0x210f2 | 4.4337 | 0x5 | R E | 0x10000 | ||
LOAD | 0x0 | 0x430000 | 0x430000 | 0x0 | 0x92fd8 | 0.0000 | 0x6 | RW | 0x10000 |
Network Behavior |
---|
No network behavior found |
---|
System Behavior |
---|
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /tmp/Mozi.m |
Arguments: | /usr/bin/qemu-mips /tmp/Mozi.m |
File size: | 307960 bytes |
MD5 hash: | cebe20a3e4eb38e9e37b995cf0d8f749 |
File Activities
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /sbin/upstart |
Arguments: | n/a |
File size: | 0 bytes |
MD5 hash: | 00000000000000000000000000000000 |
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | /bin/sh -e /proc/self/fd/9 |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
File Activities
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /bin/date |
Arguments: | date |
File size: | 68464 bytes |
MD5 hash: | 54903b613f9019bfca9f5d28a4fff34e |
File Activities
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /usr/share/apport/apport-checkreports |
Arguments: | /usr/bin/python3 /usr/share/apport/apport-checkreports --system |
File size: | 1269 bytes |
MD5 hash: | 1a7d84ebc34df04e55ca3723541f48c9 |
File Activities
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /sbin/upstart |
Arguments: | n/a |
File size: | 0 bytes |
MD5 hash: | 00000000000000000000000000000000 |
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | /bin/sh -e /proc/self/fd/9 |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
File Activities
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /bin/date |
Arguments: | date |
File size: | 68464 bytes |
MD5 hash: | 54903b613f9019bfca9f5d28a4fff34e |
File Activities
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 13:05:03 |
Start date: | 25/07/2021 |
Path: | /usr/share/apport/apport-gtk |
Arguments: | /usr/bin/python3 /usr/share/apport/apport-gtk |
File size: | 23806 bytes |
MD5 hash: | ec58a49a30ef6a29406a204f28cc7d87 |
File Activities
Start time: | 13:05:04 |
Start date: | 25/07/2021 |
Path: | /sbin/upstart |
Arguments: | n/a |
File size: | 0 bytes |
MD5 hash: | 00000000000000000000000000000000 |
Start time: | 13:05:04 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | /bin/sh -e /proc/self/fd/9 |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
File Activities
Start time: | 13:05:04 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 13:05:04 |
Start date: | 25/07/2021 |
Path: | /bin/date |
Arguments: | date |
File size: | 68464 bytes |
MD5 hash: | 54903b613f9019bfca9f5d28a4fff34e |
File Activities
Start time: | 13:05:04 |
Start date: | 25/07/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 13:05:04 |
Start date: | 25/07/2021 |
Path: | /usr/share/apport/apport-gtk |
Arguments: | /usr/bin/python3 /usr/share/apport/apport-gtk |
File size: | 23806 bytes |
MD5 hash: | ec58a49a30ef6a29406a204f28cc7d87 |