Linux Analysis Report mirai.arm7
Overview
General Information
Sample Name: | mirai.arm7 |
Analysis ID: | 475747 |
MD5: | dfdb80157f894e6237903899333f4ea9 |
SHA1: | 87de1cd84fab28404735503e005f2dfd23d5bc3d |
SHA256: | 7cc57bcffd201a2b49876d063765828a09f05dd9bd9c7d03bdd23c807706f863 |
Infos: |
Detection
Mirai
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Sample has stripped symbol table
Classification
Analysis Advice |
---|
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures |
Exit code information suggests that the sample terminated abnormally, try to lookup the sample's target architecture |
Non-zero exit code suggests an error during the execution. Lookup the error code for hints. |
Static ELF header machine description suggests that the sample might not execute correctly on this machine |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 475747 |
Start date: | 01.09.2021 |
Start time: | 14:54:19 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 34s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | mirai.arm7 |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal80.troj.linARM7@0/0@0/0 |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_Mozilla | Detects suspicious XORed keyword - Mozilla/5.0 | Florian Roth |
| |
Mirai_Botnet_Malware | Detects Mirai Botnet Malware | Florian Roth |
| |
MAL_ELF_LNX_Mirai_Oct10_2 | Detects ELF malware Mirai related | Florian Roth |
| |
JoeSecurity_Mirai_5 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_9 | Yara detected Mirai | Joe Security |
Jbx Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample |
Source: | Avira: |
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link |
System Summary: |
---|
Malicious sample detected (through community Yara rule) |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | .symtab present: |
Source: | Classification label: |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Stealing of Sensitive Information: |
---|
Yara detected Mirai |
Source: | File source: |
Remote Access Functionality: |
---|
Yara detected Mirai |
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Direct Volume Access | OS Credential Dumping | Security Software Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Malware Configuration |
---|
No configs have been found |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
57% | Virustotal | Browse | ||
100% | Avira | LINUX/Mirai.bonb |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
No contacted IP infos |
---|
Command: | /tmp/mirai.arm7 |
Exit Code: | 139 |
Exit Code Info: | SIGSEGV (11) Segmentation fault invalid memory reference |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 11 (Segmentation fault) - core dumped |
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No created / dropped files found |
---|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.069656272120174 |
TrID: |
|
File name: | mirai.arm7 |
File size: | 70952 |
MD5: | dfdb80157f894e6237903899333f4ea9 |
SHA1: | 87de1cd84fab28404735503e005f2dfd23d5bc3d |
SHA256: | 7cc57bcffd201a2b49876d063765828a09f05dd9bd9c7d03bdd23c807706f863 |
SHA512: | 12a99bb8eeaae95357e61f2704023a9b584080abf22015b4222d5b8fe2dd46735753fda1cc946b7d889a43be006ead7c65bb3ab640e294e93c38b26644eeb16a |
SSDEEP: | 1536:+xngPBbNz9PLzyKSM90ViHAiczK7F+lVZ3ENBD/qrJhrsL4IviCci/ZWK:hbhpXyK36ihczKSV5ENBD/iJwci/ZWK |
File Content Preview: | .ELF..............(.....T...4...H.......4. ...(.....................................................0...D...........Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../...............-.@0....S |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | |
Entry Point Address: | |
Flags: | |
ELF Header Size: | |
Program Header Offset: | |
Program Header Size: | |
Number of Program Headers: | |
Section Header Offset: | |
Section Header Size: | |
Number of Section Headers: | |
Header String Table Index: |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x8094 | 0x94 | 0x10 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x80b0 | 0xb0 | 0x1040c | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x184bc | 0x104bc | 0x10 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x184cc | 0x104cc | 0xbd8 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.init_array | INIT_ARRAY | 0x210a8 | 0x110ac | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.fini_array | FINI_ARRAY | 0x210ac | 0x110b0 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.got | PROGBITS | 0x210b4 | 0x110b8 | 0x74 | 0x4 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x21128 | 0x1112c | 0x1ac | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x212d4 | 0x112d8 | 0x2618 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.ARM.attributes | ARM_ATTRIBUTES | 0x0 | 0x112d8 | 0x10 | 0x0 | 0x0 | 0 | 0 | 1 | |
.shstrtab | STRTAB | 0x0 | 0x112e8 | 0x5d | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x8000 | 0x8000 | 0x110a4 | 0x110a4 | 3.2504 | 0x5 | R E | 0x8000 | .init .text .fini .rodata | |
LOAD | 0x110a8 | 0x210a8 | 0x210a4 | 0x230 | 0xa844 | 1.7450 | 0x6 | RW | 0x8000 | .init_array .fini_array .got .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x7 | RWE | 0x4 |
Network Behavior |
---|
No network behavior found |
---|
System Behavior |
---|
Start time: | 14:55:05 |
Start date: | 01/09/2021 |
Path: | /tmp/mirai.arm7 |
Arguments: | /tmp/mirai.arm7 |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |