Linux Analysis Report QWg2NTuodY

Overview

General Information

Sample Name: QWg2NTuodY
Analysis ID: 511550
MD5: 8ccfc3df4a2b63c7944837c0e3e6bb6a
SHA1: 646f16d2fb1b0a5867b69bc1dc2b369275c244b3
SHA256: fb117b5b9ba03f145f4342b65b6268b4378660bfdc9b38a00668a2d0fcacdf2c
Tags: 32armelfmirai
Infos:

Most interesting Screenshot:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Contains symbols with names commonly found in malware
Sample contains symbols with suspicious names
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample tries to kill a process (SIGKILL)

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: QWg2NTuodY Virustotal: Detection: 24% Perma Link
Source: QWg2NTuodY ReversingLabs: Detection: 27%

Networking:

barindex
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.23:56596 -> 45.95.169.120:455
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.169.120
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42

System Summary:

barindex
Contains symbols with names commonly found in malware
Source: ELF static info symbol of initial sample Name: ackattack
Source: ELF static info symbol of initial sample Name: attack_methods.c
Source: ELF static info symbol of initial sample Name: httpgetattack
Source: ELF static info symbol of initial sample Name: httpnullattack
Source: ELF static info symbol of initial sample Name: httppatchattack
Source: ELF static info symbol of initial sample Name: httppostattack
Source: ELF static info symbol of initial sample Name: httpputattack
Source: ELF static info symbol of initial sample Name: icmpechoattack
Source: ELF static info symbol of initial sample Name: minecraftattack
Source: ELF static info symbol of initial sample Name: pshattack
Sample contains symbols with suspicious names
Source: ELF static info symbol of initial sample Name: hexPayload
Source: ELF static info symbol of initial sample Name: payload
Sample tries to kill a process (SIGKILL)
Source: /tmp/QWg2NTuodY (PID: 5248) SIGKILL sent: pid: 2256, result: successful Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) SIGKILL sent: pid: 2258, result: no such process Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) SIGKILL sent: pid: 5201, result: successful Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) SIGKILL sent: pid: 5202, result: successful Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) SIGKILL sent: pid: 5319, result: successful Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) SIGKILL sent: pid: 5324, result: successful Jump to behavior
Source: classification engine Classification label: mal52.lin@0/4@0/0
Source: QWg2NTuodY Joe Sandbox Cloud Basic: Detection: clean Score: 0 Perma Link

Persistence and Installation Behavior:

barindex
Enumerates processes within the "proc" file system
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/5143/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/5143/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/5143/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/5143/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1582/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1582/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1582/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1582/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/3088/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/3088/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/3088/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/3088/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/230/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/230/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/230/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/230/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/110/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/110/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/231/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/231/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/231/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/231/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/111/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/111/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/232/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/232/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/232/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/232/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1579/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1579/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1579/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1579/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/112/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/112/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/233/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/233/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/233/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/233/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1699/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1699/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1699/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1699/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/113/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/113/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/234/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/234/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/234/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/234/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1335/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1335/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1335/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1335/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1698/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1698/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1698/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1698/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/114/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/114/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/235/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/235/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1334/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1334/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1334/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1334/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1576/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1576/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1576/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/1576/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/2302/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/2302/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/2302/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/2302/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/115/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/115/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/236/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/236/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/236/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/236/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/116/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/116/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/237/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/237/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/237/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/237/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/117/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/117/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/118/status Jump to behavior
Source: /tmp/QWg2NTuodY (PID: 5248) File opened: /proc/118/status Jump to behavior

Malware Analysis System Evasion:

barindex
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/QWg2NTuodY (PID: 5244) Queries kernel information via 'uname': Jump to behavior
Source: QWg2NTuodY, 5244.1.000000000c90265a.00000000cf845d69.rw-.sdmp Binary or memory string: (cx86_64/usr/bin/qemu-arm/tmp/QWg2NTuodYSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/QWg2NTuodY
Source: QWg2NTuodY, 5244.1.00000000426ff3ca.00000000fedb44ba.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: QWg2NTuodY, 5244.1.000000000c90265a.00000000cf845d69.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: QWg2NTuodY, 5244.1.00000000426ff3ca.00000000fedb44ba.rw-.sdmp Binary or memory string: qLV!/etc/qemu-binfmt/arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs