Play interactive tourEdit tour

Linux Analysis Report mirai.arm7

Overview

General Information

Sample Name:mirai.arm7
Analysis ID:475747
MD5:dfdb80157f894e6237903899333f4ea9
SHA1:87de1cd84fab28404735503e005f2dfd23d5bc3d
SHA256:7cc57bcffd201a2b49876d063765828a09f05dd9bd9c7d03bdd23c807706f863
Infos:

Detection

Mirai
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Sample has stripped symbol table

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures
Exit code information suggests that the sample terminated abnormally, try to lookup the sample's target architecture
Non-zero exit code suggests an error during the execution. Lookup the error code for hints.
Static ELF header machine description suggests that the sample might not execute correctly on this machine

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:475747
Start date:01.09.2021
Start time:14:54:19
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:mirai.arm7
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal80.troj.linARM7@0/0@0/0
  • system is lnxubuntu20
  • mirai.arm7 (PID: 3502, Parent: 3391, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/mirai.arm7
  • cleanup
SourceRuleDescriptionAuthorStrings
mirai.arm7SUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
  • 0x10aec:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0x10b5c:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0x10bcc:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0x10c3c:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0x10cac:$xo1: oMXKNNC\x0D\x17\x0C\x12
mirai.arm7Mirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
  • 0x104cc:$x1: POST /cdn-cgi/
  • 0x10570:$x2: /dev/misc/watchdog
  • 0x10560:$x3: /dev/watchdog
  • 0x1096c:$s1: LCOGQGPTGP
  • 0x106e0:$s3: CFOKLKQVPCVMP
  • 0x106c4:$s4: QWRGPTKQMP
  • 0x10624:$s5: HWCLVGAJ
  • 0x107f0:$s6: NKQVGLKLE
mirai.arm7MAL_ELF_LNX_Mirai_Oct10_2Detects ELF malware Mirai relatedFlorian Roth
  • 0x104cc:$c01: 50 4F 53 54 20 2F 63 64 6E 2D 63 67 69 2F 00 00 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 65 72 2D ...
mirai.arm7JoeSecurity_Mirai_5Yara detected MiraiJoe Security
    mirai.arm7JoeSecurity_Mirai_9Yara detected MiraiJoe Security

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus / Scanner detection for submitted sample
      Source: mirai.arm7Avira: detected
      Multi AV Scanner detection for submitted file
      Source: mirai.arm7Virustotal: Detection: 56%Perma Link

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)
      Source: mirai.arm7, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
      Source: mirai.arm7, type: SAMPLEMatched rule: Detects ELF malware Mirai related Author: Florian Roth
      Source: mirai.arm7, type: SAMPLEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
      Source: mirai.arm7, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
      Source: mirai.arm7, type: SAMPLEMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: classification engineClassification label: mal80.troj.linARM7@0/0@0/0
      Source: /tmp/mirai.arm7 (PID: 3502)Queries kernel information via 'uname': Jump to behavior

      Stealing of Sensitive Information:

      barindex
      Yara detected Mirai
      Source: Yara matchFile source: mirai.arm7, type: SAMPLE

      Remote Access Functionality:

      barindex
      Yara detected Mirai
      Source: Yara matchFile source: mirai.arm7, type: SAMPLE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition

      Malware Configuration

      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 475747 Sample: mirai.arm7 Startdate: 01/09/2021 Architecture: LINUX Score: 80 7 Malicious sample detected (through community Yara rule) 2->7 9 Antivirus / Scanner detection for submitted sample 2->9 11 Multi AV Scanner detection for submitted file 2->11 13 Yara detected Mirai 2->13 5 mirai.arm7 2->5         started        process3
      SourceDetectionScannerLabelLink
      mirai.arm757%VirustotalBrowse
      mirai.arm7100%AviraLINUX/Mirai.bonb
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos


      Command:/tmp/mirai.arm7
      Exit Code:139
      Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
      Killed:False
      Standard Output:

      Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found

      Static File Info

      General

      File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
      Entropy (8bit):6.069656272120174
      TrID:
      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
      File name:mirai.arm7
      File size:70952
      MD5:dfdb80157f894e6237903899333f4ea9
      SHA1:87de1cd84fab28404735503e005f2dfd23d5bc3d
      SHA256:7cc57bcffd201a2b49876d063765828a09f05dd9bd9c7d03bdd23c807706f863
      SHA512:12a99bb8eeaae95357e61f2704023a9b584080abf22015b4222d5b8fe2dd46735753fda1cc946b7d889a43be006ead7c65bb3ab640e294e93c38b26644eeb16a
      SSDEEP:1536:+xngPBbNz9PLzyKSM90ViHAiczK7F+lVZ3ENBD/qrJhrsL4IviCci/ZWK:hbhpXyK36ihczKSV5ENBD/iJwci/ZWK
      File Content Preview:.ELF..............(.....T...4...H.......4. ...(.....................................................0...D...........Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../...............-.@0....S

      ELF header

      Class:ELF32
      Data:2's complement, little endian
      Version:1 (current)
      Machine:ARM
      Version Number:0x1
      Type:EXEC (Executable file)
      OS/ABI:UNIX - System V
      ABI Version:0
      Entry Point Address:0x8154
      Flags:0x4000002
      ELF Header Size:52
      Program Header Offset:52
      Program Header Size:32
      Number of Program Headers:3
      Section Header Offset:70472
      Section Header Size:40
      Number of Section Headers:12
      Header String Table Index:11
      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
      NULL0x00x00x00x00x0000
      .initPROGBITS0x80940x940x100x00x6AX004
      .textPROGBITS0x80b00xb00x1040c0x00x6AX0016
      .finiPROGBITS0x184bc0x104bc0x100x00x6AX004
      .rodataPROGBITS0x184cc0x104cc0xbd80x00x2A004
      .init_arrayINIT_ARRAY0x210a80x110ac0x40x00x3WA004
      .fini_arrayFINI_ARRAY0x210ac0x110b00x40x00x3WA004
      .gotPROGBITS0x210b40x110b80x740x40x3WA004
      .dataPROGBITS0x211280x1112c0x1ac0x00x3WA004
      .bssNOBITS0x212d40x112d80x26180x00x3WA004
      .ARM.attributesARM_ATTRIBUTES0x00x112d80x100x00x0001
      .shstrtabSTRTAB0x00x112e80x5d0x00x0001
      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      LOAD0x00x80000x80000x110a40x110a43.25040x5R E0x8000.init .text .fini .rodata
      LOAD0x110a80x210a80x210a40x2300xa8441.74500x6RW 0x8000.init_array .fini_array .got .data .bss
      GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

      Network Behavior

      No network behavior found

      System Behavior

      Start time:14:55:05
      Start date:01/09/2021
      Path:/tmp/mirai.arm7
      Arguments:/tmp/mirai.arm7
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      File Activities

      Process Activities

      System Activities