Loading ...

Play interactive tourEdit tour

Linux Analysis Report chinaz

Overview

General Information

Sample Name:chinaz
Analysis ID:550994
MD5:b1a249a0f2e9627d460e2b86f190e51d
SHA1:7b1438586dd7c8b93285ffc774283e8fab1b82f2
SHA256:2c5ef8e33e43c4a6da2f7a2bde0d5027d344491b43dcf88c5201a3f332ccec30
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus detection for dropped file
Sample tries to persist itself using System V runlevels
Machine Learning detection for dropped file
Sample tries to persist itself using cron
Drops files in suspicious directories
Sample deletes itself
Drops invisible ELF files
Executes the "iptables" command to insert, remove and/or manipulate rules
Machine Learning detection for sample
Writes ELF files to disk
Reads CPU information from /sys indicative of miner or evasive malware
Yara signature match
Writes shell script files to disk
Reads system information from the proc file system
Uses the "uname" system call to query kernel version information (possible evasion)
Executes the "systemctl" command used for controlling the systemd system and service manager
Sample has stripped symbol table
Executes the "iptables" command used for managing IP filtering and manipulation
Executes the "modprobe" command used for loading kernel modules
Executes the "rm" command used to delete files or directories
Executes the "touch" command used to create files or modify time stamps
Writes shell script file to disk with an unusual file extension

Classification

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:550994
Start date:11.01.2022
Start time:17:51:58
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 6s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:chinaz
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171)
Analysis Mode:default
Detection:MAL
Classification:mal100.troj.evad.lin@0/11@0/0

Process Tree

  • system is lnxubuntu1
  • chinaz (PID: 6790, Parent: 6725, MD5: b1a249a0f2e9627d460e2b86f190e51d) Arguments: /tmp/chinaz
    • chinaz New Fork (PID: 6791, Parent: 6790)
      • chinaz New Fork (PID: 6792, Parent: 6791)
        • chinaz New Fork (PID: 6801, Parent: 6792)
          • chinaz New Fork (PID: 6802, Parent: 6801)
        • chinaz New Fork (PID: 6807, Parent: 6792)
          • chinaz New Fork (PID: 6810, Parent: 6807)
          • update-rc.d (PID: 6810, Parent: 3310, MD5: e9e125904f9ed8ff4c8504a55a149005) Arguments: /usr/bin/perl /usr/sbin/update-rc.d chinaz remove
            • insserv (PID: 6838, Parent: 6810, MD5: 34c11674a0b29347001640aeae7c94f1) Arguments: /usr/lib/insserv/insserv
            • systemctl (PID: 7082, Parent: 6810, MD5: b08096235b8c90203e17721264b5ce40) Arguments: systemctl daemon-reload
        • chinaz New Fork (PID: 6817, Parent: 6792)
          • chinaz New Fork (PID: 6820, Parent: 6817)
        • chinaz New Fork (PID: 6837, Parent: 6792)
          • chinaz New Fork (PID: 6841, Parent: 6837)
          • update-rc.d (PID: 6841, Parent: 6837, MD5: e9e125904f9ed8ff4c8504a55a149005) Arguments: /usr/bin/perl /usr/sbin/update-rc.d .chinaz{1641923553 defaults
            • insserv (PID: 6884, Parent: 6841, MD5: 34c11674a0b29347001640aeae7c94f1) Arguments: /usr/lib/insserv/insserv .chinaz{1641923553
            • systemctl (PID: 7085, Parent: 6841, MD5: b08096235b8c90203e17721264b5ce40) Arguments: systemctl daemon-reload
        • chinaz New Fork (PID: 6852, Parent: 6792)
        • dash (PID: 6852, Parent: 6792, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "sed -i '/\\/etc\\/cron.hourly\\/cron.sh/d' /etc/crontab && echo '*/3 * * * * root /etc/cron.hourly/cron.sh' >> /etc/crontab"
          • dash New Fork (PID: 6855, Parent: 6852)
          • sed (PID: 6855, Parent: 6852, MD5: c1a00c583ba08e728b10f3f46f5776d6) Arguments: sed -i /\\/etc\\/cron.hourly\\/cron.sh/d /etc/crontab
        • chinaz New Fork (PID: 6877, Parent: 6792)
        • dash (PID: 6877, Parent: 6792, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "rm -rf /etc/resolv.conf"
          • dash New Fork (PID: 6880, Parent: 6877)
          • rm (PID: 6880, Parent: 6877, MD5: b79876063d894c449856cca508ecca7f) Arguments: rm -rf /etc/resolv.conf
        • chinaz New Fork (PID: 6891, Parent: 6792)
        • dash (PID: 6891, Parent: 6792, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c whoami
          • dash New Fork (PID: 6902, Parent: 6891)
          • whoami (PID: 6902, Parent: 6891, MD5: a88b7850f1cdbf532f14069816273b63) Arguments: whoami
        • chinaz New Fork (PID: 6894, Parent: 6792)
        • dash (PID: 6894, Parent: 6792, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c whoami
          • dash New Fork (PID: 6897, Parent: 6894)
          • whoami (PID: 6897, Parent: 6894, MD5: a88b7850f1cdbf532f14069816273b63) Arguments: whoami
        • chinaz New Fork (PID: 6895, Parent: 6792)
        • dash (PID: 6895, Parent: 6792, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "iptables --flush"
          • dash New Fork (PID: 6898, Parent: 6895)
          • iptables (PID: 6898, Parent: 6895, MD5: e986504da7dab031032b3d3eac5b643e) Arguments: iptables --flush
            • iptables New Fork (PID: 6910, Parent: 6898)
            • modprobe (PID: 6910, Parent: 6898, MD5: unknown) Arguments: /sbin/modprobe ip_tables
        • chinaz New Fork (PID: 6917, Parent: 6792)
        • dash (PID: 6917, Parent: 6792, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "touch /home/root/ConfigDatecz"
          • dash New Fork (PID: 6919, Parent: 6917)
          • touch (PID: 6919, Parent: 6917, MD5: 1f168f69957c0fffbdd62556ad215f3c) Arguments: touch /home/root/ConfigDatecz
        • chinaz New Fork (PID: 6954, Parent: 6792)
        • dash (PID: 6954, Parent: 6792, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP"
          • dash New Fork (PID: 6959, Parent: 6954)
          • iptables (PID: 6959, Parent: 6954, MD5: e986504da7dab031032b3d3eac5b643e) Arguments: iptables -A OUTPUT -p tcp --dport 0 -j DROP
  • upstart New Fork (PID: 7044, Parent: 3310)
  • sh (PID: 7044, Parent: 3310, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: /bin/sh -e /proc/self/fd/9
    • sh New Fork (PID: 7064, Parent: 7044)
    • date (PID: 7064, Parent: 7044, MD5: 54903b613f9019bfca9f5d28a4fff34e) Arguments: date
    • sh New Fork (PID: 7073, Parent: 7044)
    • apport-checkreports (PID: 7073, Parent: 7044, MD5: 1a7d84ebc34df04e55ca3723541f48c9) Arguments: /usr/bin/python3 /usr/share/apport/apport-checkreports --system
  • upstart New Fork (PID: 7140, Parent: 3310)
  • sh (PID: 7140, Parent: 3310, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: /bin/sh -e /proc/self/fd/9
    • sh New Fork (PID: 7141, Parent: 7140)
    • date (PID: 7141, Parent: 7140, MD5: 54903b613f9019bfca9f5d28a4fff34e) Arguments: date
    • sh New Fork (PID: 7142, Parent: 7140)
    • apport-gtk (PID: 7142, Parent: 7140, MD5: ec58a49a30ef6a29406a204f28cc7d87) Arguments: /usr/bin/python3 /usr/share/apport/apport-gtk
  • upstart New Fork (PID: 7167, Parent: 3310)
  • sh (PID: 7167, Parent: 3310, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: /bin/sh -e /proc/self/fd/9
    • sh New Fork (PID: 7168, Parent: 7167)
    • date (PID: 7168, Parent: 7167, MD5: 54903b613f9019bfca9f5d28a4fff34e) Arguments: date
    • sh New Fork (PID: 7185, Parent: 7167)
    • apport-gtk (PID: 7185, Parent: 7167, MD5: ec58a49a30ef6a29406a204f28cc7d87) Arguments: /usr/bin/python3 /usr/share/apport/apport-gtk
  • cleanup

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
chinazCN_disclosed_20180208_lslsDetects malware from disclosed CN malware setFlorian Roth
  • 0xf5ef0:$x1: User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)

Dropped Files

SourceRuleDescriptionAuthorStrings
/etc/init.d/.chinaz{1641923553CN_disclosed_20180208_lslsDetects malware from disclosed CN malware setFlorian Roth
  • 0xf5ef0:$x1: User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)

Memory Dumps

SourceRuleDescriptionAuthorStrings
6807.1.0000000008048000.0000000008188000.r-x.sdmpCN_disclosed_20180208_lslsDetects malware from disclosed CN malware setFlorian Roth
  • 0xf5ef0:$x1: User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
6790.1.0000000008048000.0000000008188000.r-x.sdmpCN_disclosed_20180208_lslsDetects malware from disclosed CN malware setFlorian Roth
  • 0xf5ef0:$x1: User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
6801.1.0000000008048000.0000000008188000.r-x.sdmpCN_disclosed_20180208_lslsDetects malware from disclosed CN malware setFlorian Roth
  • 0xf5ef0:$x1: User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
6792.1.0000000008048000.0000000008188000.r-x.sdmpCN_disclosed_20180208_lslsDetects malware from disclosed CN malware setFlorian Roth
  • 0xf5ef0:$x1: User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
6791.1.0000000008048000.0000000008188000.r-x.sdmpCN_disclosed_20180208_lslsDetects malware from disclosed CN malware setFlorian Roth
  • 0xf5ef0:$x1: User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
Click to see the 4 entries

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: chinazAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: chinazVirustotal: Detection: 59%Perma Link
Source: chinazReversingLabs: Detection: 72%
Antivirus detection for dropped fileShow sources
Source: /etc/init.d/.chinaz{1641923553Avira: detection malicious, Label: LINUX/ChinaZ.qeofi
Machine Learning detection for dropped fileShow sources
Source: /etc/init.d/.chinaz{1641923553Joe Sandbox ML: detected
Machine Learning detection for sampleShow sources
Source: chinazJoe Sandbox ML: detected
Source: /tmp/chinaz (PID: 6792)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior

Networking:

barindex
Executes the "iptables" command to insert, remove and/or manipulate rulesShow sources
Source: /bin/dash (PID: 6959)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROPJump to behavior
Source: /bin/dash (PID: 6898)Iptables executable: /sbin/iptables -> iptables --flushJump to behavior
Source: /bin/dash (PID: 6959)Iptables executable: /sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROPJump to behavior
Source: chinaz, .chinaz{1641923553.8.drString found in binary or memory: http://www.gnu.org/software/libc/bugs.html

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: chinaz, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6807.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6790.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6801.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6792.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6791.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6820.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6802.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6817.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: 6837.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: /etc/init.d/.chinaz{1641923553, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
Source: chinaz, type: SAMPLEMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6807.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6790.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6801.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6792.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6791.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6820.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6802.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6817.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 6837.1.0000000008048000.0000000008188000.r-x.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: /etc/init.d/.chinaz{1641923553, type: DROPPEDMatched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal100.troj.evad.lin@0/11@0/0

Persistence and Installation Behavior:

barindex
Sample tries to persist itself using System V runlevelsShow sources
Source: /tmp/chinaz (PID: 6792)File: /etc/rc1.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc2.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc3.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc4.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc5.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc.d/rc1.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc.d/rc2.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc.d/rc3.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc.d/rc4.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /tmp/chinaz (PID: 6792)File: /etc/rc.d/rc5.d/S90.chinaz{1641923553 -> /etc/init.d/.chinaz{1641923553Jump to behavior
Source: /usr/lib/insserv/insserv (PID: 6838)File: /etc/rc1.d/S01.chinaz{1641923553 -> ../init.d/.chinaz{1641923553Jump to behavior
Source: /usr/lib/insserv/insserv (PID: 6838)File: /etc/rc2.d/S01.chinaz{1641923553 -> ../init.d/.chinaz{1641923553Jump to behavior
Source: /usr/lib/insserv/insserv (PID: 6838)File: /etc/rc3.d/S01.chinaz{1641923553 -> ../init.d/.chinaz{1641923553Jump to behavior
Source: /usr/lib/insserv/insserv (PID: 6838)File: /etc/rc4.d/S01.chinaz{1641923553 -> ../init.d/.chinaz{1641923553Jump to behavior
Source: /usr/lib/insserv/insserv (PID: 6838)File: /etc/rc5.d/S01.chinaz{1641923553 -> ../init.d/.chinaz{1641923553Jump to behavior
Sample tries to persist itself using cronShow sources
Source: /tmp/chinaz (PID: 6792)File: /etc/cron.hourly/cron.shJump to behavior
Source: /bin/sed (PID: 6855)File: /etc/crontabJump to behavior
Executes the "iptables" command to insert, remove and/or manipulate rulesShow sources
Source: /bin/dash (PID: 6959)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROPJump to behavior
Source: /tmp/chinaz (PID: 6792)File written: /tmp/.chinaz{1641923553Jump to dropped file
Source: /tmp/chinaz (PID: 6792)Shell script file created: /etc/cron.hourly/cron.shJump to dropped file
Source: /tmp/chinaz (PID: 6792)Reads from proc file: /proc/meminfoJump to behavior
Source: /usr/sbin/update-rc.d (PID: 7082)Systemctl executable: /bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /usr/sbin/update-rc.d (PID: 7085)Systemctl executable: /bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /bin/dash (PID: 6898)Iptables executable: /sbin/iptables -> iptables --flushJump to behavior
Source: /bin/dash (PID: 6959)Iptables executable: /sbin/iptables -> iptables -A OUTPUT -p tcp --dport 0 -j DROPJump to behavior
Source: /bin/dash (PID: 6880)Rm executable: /bin/rm -> rm -rf /etc/resolv.confJump to behavior
Source: /bin/dash (PID: 6919)Touch executable: /usr/bin/touch -> touch /home/root/ConfigDateczJump to behavior
Source: /tmp/chinaz (PID: 6792)Writes shell script file to disk with an unusual file extension: /etc/init.d/.chinaz{1641923553Jump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Drops files in suspicious directoriesShow sources
Source: /tmp/chinaz (PID: 6792)File: /etc/init.d/.chinaz{1641923553Jump to dropped file
Source: /usr/lib/insserv/insserv (PID: 6838)File: /etc/init.d/.depend.boot
Source: /usr/lib/insserv/insserv (PID: 6838)File: /etc/init.d/.depend.start
Source: /usr/lib/insserv/insserv (PID: 6838)File: /etc/init.d/.depend.stop
Source: /usr/lib/insserv/insserv (PID: 6884)File: /etc/init.d/.depend.bootJump to dropped file
Source: /usr/lib/insserv/insserv (PID: 6884)File: /etc/init.d/.depend.startJump to dropped file
Source: /usr/lib/insserv/insserv (PID: 6884)File: /etc/init.d/.depend.stopJump to dropped file
Sample deletes itselfShow sources
Source: /tmp/chinaz (PID: 6792)File: /tmp/chinazJump to behavior
Drops invisible ELF filesShow sources
Source: /tmp/chinaz (PID: 6792)ELF file: /tmp/.chinaz{1641923553Jump to dropped file
Source: /sbin/iptables (PID: 6910)Modprobe: /sbin/modprobe -> /sbin/modprobe ip_tablesJump to behavior
Source: /tmp/chinaz (PID: 6792)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /tmp/chinaz (PID: 6790)Queries kernel information via 'uname': Jump to behavior
Source: /tmp/chinaz (PID: 6792)Queries kernel information via 'uname': Jump to behavior
Source: /sbin/modprobe (PID: 6910)Queries kernel information via 'uname': Jump to behavior
Source: /usr/share/apport/apport-gtk (PID: 7142)Queries kernel information via 'uname': Jump to behavior
Source: /usr/share/apport/apport-gtk (PID: 7185)Queries kernel information via 'uname': Jump to behavior
Source: .depend.boot.31.dr, .depend.boot.19.drBinary or memory string: qemu-kvm: mountkernfs.sh udev
Source: .depend.boot.31.dr, .depend.boot.19.drBinary or memory string: TARGETS = console-setup resolvconf alsa-utils mountkernfs.sh ufw plymouth-log hostname.sh lm-sensors screen-cleanup pppd-dns apparmor x11-common udev keyboard-setup mountdevsubfs.sh brltty procps qemu-kvm cryptdisks cryptdisks-early hwclock.sh open-iscsi networking iscsid checkroot.sh lvm2 urandom checkfs.sh mountall.sh mountall-bootclean.sh bootmisc.sh kmod mountnfs.sh checkroot-bootclean.sh mountnfs-bootclean.sh

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting1Systemd Service1Systemd Service1Masquerading1OS Credential DumpingSecurity Software Discovery11Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsAt (Linux)2Kernel Modules and Extensions1Kernel Modules and Extensions1Scripting1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)At (Linux)2At (Linux)2Hidden Files and Directories1Security Account ManagerSystem Network Configuration Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Indicator Removal on Host1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion11LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Malware Configuration

No configs have been found

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 550994 Sample: chinaz Startdate: 11/01/2022 Architecture: LINUX Score: 100 95 Malicious sample detected (through community Yara rule) 2->95 97 Antivirus detection for dropped file 2->97 99 Antivirus / Scanner detection for submitted sample 2->99 101 3 other signatures 2->101 10 chinaz 2->10         started        12 upstart sh 2->12         started        14 upstart sh 2->14         started        16 upstart sh 2->16         started        process3 process4 18 chinaz 10->18         started        20 sh date 12->20         started        22 sh apport-checkreports 12->22         started        24 sh date 14->24         started        26 sh apport-gtk 14->26         started        28 sh date 16->28         started        30 sh apport-gtk 16->30         started        process5 32 chinaz 18->32         started        file6 71 /tmp/.chinaz{1641923553, ELF 32->71 dropped 73 /etc/init.d/.chinaz{1641923553, POSIX 32->73 dropped 75 /etc/cron.hourly/cron.sh, POSIX 32->75 dropped 87 Drops invisible ELF files 32->87 89 Drops files in suspicious directories 32->89 91 Sample deletes itself 32->91 93 2 other signatures 32->93 36 chinaz 32->36         started        38 chinaz 32->38         started        40 chinaz dash 32->40         started        42 8 other processes 32->42 signatures7 process8 process9 44 chinaz update-rc.d 36->44         started        46 chinaz update-rc.d 38->46         started        48 dash sed 40->48         started        51 dash iptables 42->51         started        53 dash iptables 42->53         started        55 dash rm 42->55         started        57 5 other processes 42->57 signatures10 59 update-rc.d insserv 44->59         started        63 update-rc.d systemctl 44->63         started        65 update-rc.d insserv 46->65         started        67 update-rc.d systemctl 46->67         started        83 Sample tries to persist itself using cron 48->83 85 Executes the "iptables" command to insert, remove and/or manipulate rules 51->85 69 iptables modprobe 53->69         started        process11 file12 77 /etc/init.d/.depend.stop, ASCII 59->77 dropped 79 /etc/init.d/.depend.start, ASCII 59->79 dropped 81 /etc/init.d/.depend.boot, ASCII 59->81 dropped 103 Drops files in suspicious directories 59->103 105 Sample tries to persist itself using System V runlevels 65->105 signatures13

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
chinaz60%VirustotalBrowse
chinaz72%ReversingLabsLinux.Trojan.XorDDoS
chinaz100%AviraLINUX/ChinaZ.qeofi
chinaz100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
/etc/init.d/.chinaz{1641923553100%AviraLINUX/ChinaZ.qeofi
/etc/init.d/.chinaz{1641923553100%Joe Sandbox ML
/etc/cron.hourly/cron.sh5%VirustotalBrowse
/etc/cron.hourly/cron.sh11%MetadefenderBrowse
/etc/cron.hourly/cron.sh14%ReversingLabsLinux.Trojan.XorDDoS

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.gnu.org/software/libc/bugs.htmlchinaz, .chinaz{1641923553.8.drfalse
    high

    Contacted IPs

    No contacted IP infos


    Runtime Messages

    Command:/tmp/chinaz
    Exit Code:0
    Exit Code Info:
    Killed:False
    Standard Output:

    Standard Error:

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    /etc/cron.hourly/cron.shHuuyISbqrLGet hashmaliciousBrowse
      BK86XsOVqXGet hashmaliciousBrowse

        Created / dropped Files

        /etc/cron.hourly/cron.sh
        Process:/tmp/chinaz
        File Type:POSIX shell script, ASCII text executable
        Category:dropped
        Size (bytes):223
        Entropy (8bit):4.756432444291805
        Encrypted:false
        SSDEEP:6:htiy4Mrm9lVNy28XbCVP270gJdUiynrgns:RjwVNfGbWPirSR
        MD5:B791B087B1795E3674A9AA765C76FC04
        SHA1:B53F478234AE97F3CDBF2E7FE7EC68D687FEB7C1
        SHA-256:1C1E9B69CF8021BF7CE1F60DCAA2D31C1E21ED4B6E474F3571DA81FFD5A9B69E
        SHA-512:2DCC2E478C51CF8118306FD5C744AAD7147E368CBC4329DB1CC5FAC52088A7F3354079AE2B582B270495789E4FB4591538EC88BB5EA40EEC646F360BAC33BBB2
        Malicious:true
        Antivirus:
        • Antivirus: Virustotal, Detection: 5%, Browse
        • Antivirus: Metadefender, Detection: 11%, Browse
        • Antivirus: ReversingLabs, Detection: 14%
        Joe Sandbox View:
        • Filename: HuuyISbqrL, Detection: malicious, Browse
        • Filename: BK86XsOVqX, Detection: malicious, Browse
        Reputation:low
        Preview: #!/bin/sh.PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/usr/X11R6/bin.for i in `cat /proc/net/dev|grep :|awk -F: {'print $1'}`; do ifconfig $i up& done.cp /lib/udev/udev /lib/udev/debug./lib/udev/debug.
        /etc/init.d/.chinaz{1641923553
        Process:/tmp/chinaz
        File Type:POSIX shell script, ASCII text executable
        Category:dropped
        Size (bytes):355
        Entropy (8bit):5.348956811098055
        Encrypted:false
        SSDEEP:6:hUtoFdU9uMw2DjnnsKheJjU5DjBE21YJvmNeMwh2L5DjR1DzRIjupa6MzEupq4:6tw23mjcXBEMO12L5rzujupazEupN
        MD5:9B4D23AB68C5E489F8F51068A78C66A0
        SHA1:3823D3B8745D5349C20A2B6D37FE68975E36A388
        SHA-256:DE7BB3CD3B506B4928A9695379DDEB476F4952BFD55CEE8B52D89DE3058E929D
        SHA-512:45503211B41982A588ADFAD90E139659F4321DDE4C5DC45E2FF22D040F6E655552B3602B3D87A684113F1679F100664FACF8EBB59703163A690B9762AC78AB5A
        Malicious:true
        Yara Hits:
        • Rule: CN_disclosed_20180208_lsls, Description: Detects malware from disclosed CN malware set, Source: /etc/init.d/.chinaz{1641923553, Author: Florian Roth
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        Reputation:low
        Preview: #!/bin/sh.# chkconfig: 12345 90 90.# description: .chinaz{1641923553.### BEGIN INIT INFO.# Provides:...chinaz{1641923553.# Required-Start:..# Required-Stop:..# Default-Start:.1 2 3 4 5.# Default-Stop:...# Short-Description:..chinaz{1641923553.### END INIT INFO.case $1 in.start)../tmp/.chinaz{1641923553..;;.stop)..;;.*)../tmp/.chinaz{1641923553..;;.esac.
        /etc/init.d/.depend.boot
        Process:/usr/lib/insserv/insserv
        File Type:ASCII text, with very long lines
        Category:dropped
        Size (bytes):1380
        Entropy (8bit):4.6286085863457025
        Encrypted:false
        SSDEEP:24:KcR684NIwOkJVARL9Eg3U3PX2xRmbUtOeAyh1ZFDSYpY3dOUwZlY:VR6843OkjARLq0U3PX2xYwtOQh1vDTp8
        MD5:5B62F52693F19BAD0D1373AB955F17B8
        SHA1:3865ED303BD83951D0D69D87A6290F120A937C2E
        SHA-256:9026F82085CF03BE408767439E4FD595F266FE6F11ECC4A3AF7F0555ED358196
        SHA-512:E0015AA580EAAFFF64D59F666FDC91280AAC50C10D5189A13B376E3C9DC71A0FE019D7EE05351F1136F65F5F1CAE6C58D781CBA2E073D57E323629BF5137BE25
        Malicious:true
        Reputation:moderate, very likely benign file
        Preview: TARGETS = console-setup resolvconf alsa-utils mountkernfs.sh ufw plymouth-log hostname.sh lm-sensors screen-cleanup pppd-dns apparmor x11-common udev keyboard-setup mountdevsubfs.sh brltty procps qemu-kvm cryptdisks cryptdisks-early hwclock.sh open-iscsi networking iscsid checkroot.sh lvm2 urandom checkfs.sh mountall.sh mountall-bootclean.sh bootmisc.sh kmod mountnfs.sh checkroot-bootclean.sh mountnfs-bootclean.sh.INTERACTIVE = console-setup udev keyboard-setup cryptdisks cryptdisks-early checkroot.sh checkfs.sh.udev: mountkernfs.sh.keyboard-setup: mountkernfs.sh udev.mountdevsubfs.sh: mountkernfs.sh udev.brltty: mountkernfs.sh udev.procps: mountkernfs.sh udev.qemu-kvm: mountkernfs.sh udev.cryptdisks: checkroot.sh cryptdisks-early udev lvm2.cryptdisks-early: checkroot.sh udev.hwclock.sh: mountdevsubfs.sh.open-iscsi: networking iscsid.networking: resolvconf mountkernfs.sh urandom procps.iscsid: networking.checkroot.sh: hwclock.sh mountdevsubfs.sh hostname.sh keyboard-setup.lvm2: cryptdi
        /etc/init.d/.depend.start
        Process:/usr/lib/insserv/insserv
        File Type:ASCII text, with very long lines
        Category:dropped
        Size (bytes):1747
        Entropy (8bit):4.765110587196196
        Encrypted:false
        SSDEEP:48:ZurDNySAzo1kyE27ZGme/9/n2U5X+/9/n2U5Xo/9/n2U5X8h/9/n2U5XM:+DWo1PE27keU5eeU5YeU54eU58
        MD5:4E7BE4A340D737727E65CDB7153FF44A
        SHA1:64E177AFB49715C86F913EA61CAAE0F78AB5ADCB
        SHA-256:4FF28A9681F87884DE918FF330799ACD6EBD90D9CDECC9B7D36C0A60302EF123
        SHA-512:82658FD873201E0FC8774A1594D0FFF81DB94A0AD163D7DB06E26B28C33756EB0A5F730288768A0293D99430B4C290EE5BF701B66306885B7652CA080AFA7A50
        Malicious:true
        Reputation:low
        Preview: TARGETS = rsyslog unattended-upgrades open-vm-tools lvm2-lvmetad uuidd lxd lvm2-lvmpolld lxcfs .chinaz{1641923553 killprocs binfmt-support apport mdadm dbus speech-dispatcher hddtemp kerneloops irqbalance single whoopsie rsync ssh acpid lightdm bluetooth avahi-daemon cups-browsed saned plymouth grub-common ondemand rc.local.INTERACTIVE =.mdadm: rsyslog.dbus: rsyslog.speech-dispatcher: rsyslog.hddtemp: rsyslog.kerneloops: rsyslog.irqbalance: rsyslog.single: killprocs .chinaz{1641923553.whoopsie: rsyslog.rsync: rsyslog.ssh: rsyslog.acpid: rsyslog.lightdm: dbus acpid.bluetooth: rsyslog dbus.avahi-daemon: dbus rsyslog.cups-browsed: rsyslog.saned: rsyslog dbus.plymouth: rsyslog mdadm unattended-upgrades open-vm-tools cups-browsed lvm2-lvmetad uuidd dbus speech-dispatcher lxd hddtemp kerneloops lightdm bluetooth irqbalance lvm2-lvmpolld avahi-daemon lxcfs .chinaz{1641923553 saned whoopsie rsync ssh acpid binfmt-support apport.grub-common: rsyslog mdadm unattended-upgrades open-vm-tools cups-
        /etc/init.d/.depend.stop
        Process:/usr/lib/insserv/insserv
        File Type:ASCII text, with very long lines
        Category:dropped
        Size (bytes):1690
        Entropy (8bit):4.52194295219339
        Encrypted:false
        SSDEEP:48:3Yu8rBj1G4GJ/suwT2UKGhuw2zOsuwK2UPOiNQh/4uwHFn2U5wT:M1iUJeZU1cU0
        MD5:7897338A208ABF2E5C95E7994A24F8C8
        SHA1:185E660978A050BD66B62C6AF44695251A373390
        SHA-256:7143B8292EB1C2476411ECA94A4A67E5A166C9FB916724B3458247D1C0E1F5CB
        SHA-512:F322DB116C7DE93E68D9709B8E2CE8163BC1E0BEB264D5D178815DB839FFB3E88AF4C17B4095BFB60A579B103CE48D67B1A257CA3394FCFD46FDA97A473C2632
        Malicious:true
        Reputation:low
        Preview: TARGETS = atd network-manager cups anacron cron unattended-upgrades open-vm-tools lvm2-lvmetad uuidd lxd lvm2-lvmpolld lxcfs mdadm resolvconf speech-dispatcher hddtemp alsa-utils kerneloops irqbalance ufw whoopsie lightdm bluetooth cups-browsed saned plymouth open-iscsi urandom avahi-daemon iscsid sendsigs rsyslog umountnfs.sh hwclock.sh networking umountfs cryptdisks cryptdisks-early umountroot mdadm-waitidle halt reboot.avahi-daemon: cups-browsed saned.iscsid: open-iscsi.sendsigs: atd mdadm open-iscsi unattended-upgrades open-vm-tools cups-browsed plymouth uuidd network-manager speech-dispatcher lxd hddtemp iscsid alsa-utils kerneloops lightdm bluetooth irqbalance avahi-daemon lxcfs.rsyslog: atd mdadm sendsigs cups-browsed network-manager speech-dispatcher hddtemp kerneloops bluetooth irqbalance avahi-daemon cups saned whoopsie.umountnfs.sh: atd unattended-upgrades open-vm-tools rsyslog cups-browsed plymouth uuidd network-manager speech-dispatcher lxd hddtemp sendsigs alsa-utils kern
        /tmp/.chinaz{1641923553
        Process:/tmp/chinaz
        File Type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, for GNU/Linux 2.6.18, BuildID[sha1]=307edfa923d9ff7e3793ec8771ab90f5343cb21e, stripped
        Category:dropped
        Size (bytes):1315556
        Entropy (8bit):6.3900573752414855
        Encrypted:false
        SSDEEP:24576:8kUpotcUSzgtPLdOEG0V0JRzFB3ywyUZ1N2AhNdhBjh+hnPlVVW0Mk7t69Kx/ti8:MoKXwZOK0TFBCwy8P2AhNdhBjh+hnPlP
        MD5:B1A249A0F2E9627D460E2B86F190E51D
        SHA1:7B1438586DD7C8B93285FFC774283E8FAB1B82F2
        SHA-256:2C5EF8E33E43C4A6DA2F7A2BDE0D5027D344491B43DCF88C5201A3F332CCEC30
        SHA-512:4B4EE9E06E7FFFB5D34F68FBC7F575AB5504BDEC3C11A3570FE9F8C85199BCC029BCF15CB89CAD7DFB1A24CC963B9C89DEE20349C12414F95C28062A39B83D58
        Malicious:true
        Reputation:low
        Preview: .ELF........................4...........4. ...(.................................................................................D...D.............................L...........Q.td........................................GNU.............................GNU.0~.#..~7..q...4<..p...*...t...*...x...*...|...*.......*.......*.......*...U..S........[........|.....t..~........D<..X[...%p...h..........%t...h..........%x...h..........%|...h..........%....h..........%....h..........%....h.........1.^....PTRh....h0...QVh......;.................U..S.d$.=`....uS......d...............9.s...t&.....d...........d...9.r.......t...$.....1....`.....d$.[]..t&.U.......d$......Z........t .T$..D$......D$.h.....$.....4..........t........t...$..............U..WVS....u..}...E...............1..E......E....)E.)E..7..&.......O..N.]............).k..)..a.....\.......t>.C.<.v.C.<.w:...O..N.]...........).k..)..A.....\.......u...[^_].f..................'....U1..1.V.u.S.]......t.f.................
        /var/crash/_usr_share_apport_apport-checkreports.1000.crash
        Process:/usr/share/apport/apport-checkreports
        File Type:ASCII text
        Category:dropped
        Size (bytes):14915
        Entropy (8bit):4.694665867199824
        Encrypted:false
        SSDEEP:96:1Im4p8CDUKWw4b/sspgX1AE/DKz+E+8n1Hh8vwfEYe1KPIBd4YXrM:1zCD6w4b/ssf3+E+8newfEYegPIPhbM
        MD5:26A3A8DAB6EE5B015362B9B2D3720350
        SHA1:8A3628E77409889D197926938BC2E88B766D7EFD
        SHA-256:85B8DEC8A8AD539B531052B76A0D4AFA453445D4367A7DD23BF217BE8536BAF8
        SHA-512:8D9B23C41C4CEDE0344A5382B7388E12A9228C5A56406C149B68DF340A0FE5A51144AB18AD6F7A585E1DE3FB04605EB985948C0FD1C61D1534074FBABCC3A9AA
        Malicious:false
        Reputation:low
        Preview: ProblemType: Crash.Date: Tue Jan 11 18:52:35 2022.ExecutablePath: /usr/share/apport/apport-checkreports.ExecutableTimestamp: 1514927430.InterpreterPath: /usr/bin/python3.5.ProcCmdline: /usr/bin/python3 /usr/share/apport/apport-checkreports --system.ProcCwd: /home/user.ProcEnviron:. LANGUAGE=en_US. PATH=(custom, user). XDG_RUNTIME_DIR=<set>. LANG=en_US.UTF-8. SHELL=/bin/bash.ProcMaps:. 00400000-007a9000 r-xp 00000000 fc:00 217 /usr/bin/python3.5. 009a9000-009ab000 r--p 003a9000 fc:00 217 /usr/bin/python3.5. 009ab000-00a42000 rw-p 003ab000 fc:00 217 /usr/bin/python3.5. 00a42000-00a73000 rw-p 00000000 00:00 0 . 01a1c000-01d74000 rw-p 00000000 00:00 0 [heap]. 7effa7cbc000-7effa7e3d000 rw-p 00000000 00:00 0 . 7effa7e3d000-7effa7e54000 r-xp 00000000 fc:00 2382 /usr/lib/x86_64-linux-gnu/liblz4.so.1.7.1. 7effa7e54000-7effa8053000 ---p 00017000 fc:0
        /var/crash/_usr_share_apport_apport-gtk.1000.crash
        Process:/usr/share/apport/apport-gtk
        File Type:ASCII text
        Category:dropped
        Size (bytes):47094
        Entropy (8bit):4.515770717587538
        Encrypted:false
        SSDEEP:768:5r21XXfYKGWB5lrG9GIaXzIRspIUc/x/O/R/vw2sCY9dby1DFK59vPUaG0k:5r21XXfYKGWB5lrG9GIaXzIRspIUc/xM
        MD5:D26F83931D5226DF3F84F2F39A925BD7
        SHA1:8D2A3DDAD6234D6AB9E4060AD9DEE1678467BA2F
        SHA-256:2A484CBB8C467138294EDC036C4353DA4738786AEE27C16BAFF8471A10A83A62
        SHA-512:B77A0FF36A1D510D57B47BA2D8D288ABC230681D4804C338C3AF935360C4186C0EB1B50AE22355F2E71BBF29911BBD31D8BFB9145E442D03E32D235C16EF348C
        Malicious:false
        Reputation:low
        Preview: ProblemType: Crash.Date: Tue Jan 11 18:52:35 2022.ExecutablePath: /usr/share/apport/apport-gtk.ExecutableTimestamp: 1514927430.InterpreterPath: /usr/bin/python3.5.ProcCmdline: /usr/bin/python3 /usr/share/apport/apport-gtk.ProcCwd: /home/user.ProcEnviron:. LANGUAGE=en_US. PATH=(custom, user). XDG_RUNTIME_DIR=<set>. LANG=en_US.UTF-8. SHELL=/bin/bash.ProcMaps:. 00400000-007a9000 r-xp 00000000 fc:00 217 /usr/bin/python3.5. 009a9000-009ab000 r--p 003a9000 fc:00 217 /usr/bin/python3.5. 009ab000-00a42000 rw-p 003ab000 fc:00 217 /usr/bin/python3.5. 00a42000-00a73000 rw-p 00000000 00:00 0 . 016fd000-01c1e000 rw-p 00000000 00:00 0 [heap]. 7efc7b73b000-7efc7b83b000 rw-p 00000000 00:00 0 . 7efc7b83b000-7efc7b852000 r-xp 00000000 fc:00 2382 /usr/lib/x86_64-linux-gnu/liblz4.so.1.7.1. 7efc7b852000-7efc7ba51000 ---p 00017000 fc:00 2382

        Static File Info

        General

        File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, for GNU/Linux 2.6.18, BuildID[sha1]=307edfa923d9ff7e3793ec8771ab90f5343cb21e, stripped
        Entropy (8bit):6.3900573752414855
        TrID:
        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
        File name:chinaz
        File size:1315556
        MD5:b1a249a0f2e9627d460e2b86f190e51d
        SHA1:7b1438586dd7c8b93285ffc774283e8fab1b82f2
        SHA256:2c5ef8e33e43c4a6da2f7a2bde0d5027d344491b43dcf88c5201a3f332ccec30
        SHA512:4b4ee9e06e7fffb5d34f68fbc7f575ab5504bdec3c11a3570fe9f8c85199bcc029bcf15cb89cad7dfb1a24cc963b9c89dee20349c12414f95c28062a39b83d58
        SSDEEP:24576:8kUpotcUSzgtPLdOEG0V0JRzFB3ywyUZ1N2AhNdhBjh+hnPlVVW0Mk7t69Kx/ti8:MoKXwZOK0TFBCwy8P2AhNdhBjh+hnPlP
        File Content Preview:.ELF........................4...........4. ...(.....................................................................................D...D...............................L...........Q.td........................................GNU............................

        Static ELF Info

        ELF header

        Class:ELF32
        Data:2's complement, little endian
        Version:1 (current)
        Machine:Intel 80386
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - Linux
        ABI Version:0
        Entry Point Address:0x80481f0
        Flags:0x0
        ELF Header Size:52
        Program Header Offset:52
        Program Header Size:32
        Number of Program Headers:5
        Section Header Offset:1314316
        Section Header Size:40
        Number of Section Headers:31
        Header String Table Index:30

        Sections

        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
        NULL0x00x00x00x00x0000
        .note.ABI-tagNOTE0x80480d40xd40x200x00x2A004
        .note.gnu.build-idNOTE0x80480f40xf40x240x00x2A004
        .rel.pltREL0x80481180x1180x380x80x2A054
        .initPROGBITS0x80481500x1500x300x00x6AX004
        .pltPROGBITS0x80481800x1800x700x00x6AX004
        .textPROGBITS0x80481f00x1f00xf3bfc0x00x6AX0016
        __libc_freeres_fnPROGBITS0x813bdf00xf3df00x18380x00x6AX0016
        __libc_thread_freeres_fnPROGBITS0x813d6300xf56300x1fa0x00x6AX0016
        .finiPROGBITS0x813d82c0xf582c0x1c0x00x6AX004
        .rodataPROGBITS0x813d8600xf58600x1d5e40x00x2A0032
        __libc_subfreeresPROGBITS0x815ae440x112e440x340x00x2A004
        __libc_atexitPROGBITS0x815ae780x112e780x40x00x2A004
        __libc_thread_subfreeresPROGBITS0x815ae7c0x112e7c0x80x00x2A004
        .stapsdt.basePROGBITS0x815ae840x112e840x10x00x2A001
        .eh_framePROGBITS0x815ae880x112e880x2843c0x00x2A004
        .gcc_except_tablePROGBITS0x81832c40x13b2c40x40100x00x2A004
        .tdataPROGBITS0x81882d40x13f2d40x140x00x403WAT004
        .tbssNOBITS0x81882e80x13f2e80x380x00x403WAT004
        .ctorsPROGBITS0x81882e80x13f2e80x280x00x3WA004
        .dtorsPROGBITS0x81883100x13f3100xc0x00x3WA004
        .jcrPROGBITS0x818831c0x13f31c0x40x00x3WA004
        .data.rel.roPROGBITS0x81883200x13f3200xca00x00x3WA0032
        .gotPROGBITS0x8188fc00x13ffc00xa40x40x3WA004
        .got.pltPROGBITS0x81890640x1400640x280x40x3WA004
        .dataPROGBITS0x81890a00x1400a00x9b40x00x3WA0032
        .bssNOBITS0x8189a600x140a540xbb1c0x00x3WA0032
        __libc_freeres_ptrsNOBITS0x819557c0x140a540x180x00x3WA004
        .note.stapsdtNOTE0x00x140a540x23c0x00x0004
        .commentPROGBITS0x00x140c900x2d0x10x30MS001
        .shstrtabSTRTAB0x00x140cbd0x14e0x00x0001

        Program Segments

        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x80480000x80480000x13f2d40x13f2d43.56690x5R E0x1000.note.ABI-tag .note.gnu.build-id .rel.plt .init .plt .text __libc_freeres_fn __libc_thread_freeres_fn .fini .rodata __libc_subfreeres __libc_atexit __libc_thread_subfreeres .stapsdt.base .eh_frame .gcc_except_table
        LOAD0x13f2d40x81882d40x81882d40x17800xd2c02.89790x6RW 0x1000.ctors .dtors .jcr .data.rel.ro .got .got.plt .data .bss __libc_freeres_ptrs
        NOTE0xd40x80480d40x80480d40x440x442.50770x4R 0x4.note.ABI-tag .note.gnu.build-id
        TLS0x13f2d40x81882d40x81882d40x140x4c1.39660x4R 0x4
        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

        Network Behavior

        No network behavior found

        System Behavior

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:/tmp/chinaz
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/sbin/update-rc.d
        Arguments:/usr/bin/perl /usr/sbin/update-rc.d chinaz remove
        File size:14437 bytes
        MD5 hash:e9e125904f9ed8ff4c8504a55a149005

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/sbin/update-rc.d
        Arguments:n/a
        File size:14437 bytes
        MD5 hash:e9e125904f9ed8ff4c8504a55a149005

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/lib/insserv/insserv
        Arguments:/usr/lib/insserv/insserv
        File size:56512 bytes
        MD5 hash:34c11674a0b29347001640aeae7c94f1

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/usr/sbin/update-rc.d
        Arguments:n/a
        File size:14437 bytes
        MD5 hash:e9e125904f9ed8ff4c8504a55a149005

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/bin/systemctl
        Arguments:systemctl daemon-reload
        File size:659848 bytes
        MD5 hash:b08096235b8c90203e17721264b5ce40

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/sbin/update-rc.d
        Arguments:/usr/bin/perl /usr/sbin/update-rc.d .chinaz{1641923553 defaults
        File size:14437 bytes
        MD5 hash:e9e125904f9ed8ff4c8504a55a149005

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/sbin/update-rc.d
        Arguments:n/a
        File size:14437 bytes
        MD5 hash:e9e125904f9ed8ff4c8504a55a149005

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/lib/insserv/insserv
        Arguments:/usr/lib/insserv/insserv .chinaz{1641923553
        File size:56512 bytes
        MD5 hash:34c11674a0b29347001640aeae7c94f1

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/usr/sbin/update-rc.d
        Arguments:n/a
        File size:14437 bytes
        MD5 hash:e9e125904f9ed8ff4c8504a55a149005

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/bin/systemctl
        Arguments:systemctl daemon-reload
        File size:659848 bytes
        MD5 hash:b08096235b8c90203e17721264b5ce40

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:sh -c "sed -i '/\\/etc\\/cron.hourly\\/cron.sh/d' /etc/crontab && echo '*/3 * * * * root /etc/cron.hourly/cron.sh' >> /etc/crontab"
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:n/a
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/sed
        Arguments:sed -i /\\/etc\\/cron.hourly\\/cron.sh/d /etc/crontab
        File size:73424 bytes
        MD5 hash:c1a00c583ba08e728b10f3f46f5776d6

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:sh -c "rm -rf /etc/resolv.conf"
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:n/a
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/rm
        Arguments:rm -rf /etc/resolv.conf
        File size:60272 bytes
        MD5 hash:b79876063d894c449856cca508ecca7f

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:sh -c whoami
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:n/a
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/bin/whoami
        Arguments:whoami
        File size:27312 bytes
        MD5 hash:a88b7850f1cdbf532f14069816273b63

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:sh -c whoami
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:n/a
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/bin/whoami
        Arguments:whoami
        File size:27312 bytes
        MD5 hash:a88b7850f1cdbf532f14069816273b63

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:sh -c "iptables --flush"
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:n/a
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/sbin/iptables
        Arguments:iptables --flush
        File size:13 bytes
        MD5 hash:e986504da7dab031032b3d3eac5b643e

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/sbin/iptables
        Arguments:n/a
        File size:13 bytes
        MD5 hash:e986504da7dab031032b3d3eac5b643e

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/sbin/modprobe
        Arguments:/sbin/modprobe ip_tables
        File size:0 bytes
        MD5 hash:unknown

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:sh -c "touch /home/root/ConfigDatecz"
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:n/a
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/usr/bin/touch
        Arguments:touch /home/root/ConfigDatecz
        File size:10 bytes
        MD5 hash:1f168f69957c0fffbdd62556ad215f3c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/tmp/chinaz
        Arguments:n/a
        File size:1315556 bytes
        MD5 hash:b1a249a0f2e9627d460e2b86f190e51d

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:sh -c "iptables -A OUTPUT -p tcp --dport 0 -j DROP"
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/bin/dash
        Arguments:n/a
        File size:154072 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:33
        Start date:11/01/2022
        Path:/sbin/iptables
        Arguments:iptables -A OUTPUT -p tcp --dport 0 -j DROP
        File size:13 bytes
        MD5 hash:e986504da7dab031032b3d3eac5b643e

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/sbin/upstart
        Arguments:n/a
        File size:0 bytes
        MD5 hash:unknown

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:/bin/sh -e /proc/self/fd/9
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:n/a
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/bin/date
        Arguments:date
        File size:68464 bytes
        MD5 hash:54903b613f9019bfca9f5d28a4fff34e

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:n/a
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:34
        Start date:11/01/2022
        Path:/usr/share/apport/apport-checkreports
        Arguments:/usr/bin/python3 /usr/share/apport/apport-checkreports --system
        File size:1269 bytes
        MD5 hash:1a7d84ebc34df04e55ca3723541f48c9

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/sbin/upstart
        Arguments:n/a
        File size:0 bytes
        MD5 hash:unknown

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:/bin/sh -e /proc/self/fd/9
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:n/a
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/bin/date
        Arguments:date
        File size:68464 bytes
        MD5 hash:54903b613f9019bfca9f5d28a4fff34e

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:n/a
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/usr/share/apport/apport-gtk
        Arguments:/usr/bin/python3 /usr/share/apport/apport-gtk
        File size:23806 bytes
        MD5 hash:ec58a49a30ef6a29406a204f28cc7d87

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/sbin/upstart
        Arguments:n/a
        File size:0 bytes
        MD5 hash:unknown

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:/bin/sh -e /proc/self/fd/9
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:n/a
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/bin/date
        Arguments:date
        File size:68464 bytes
        MD5 hash:54903b613f9019bfca9f5d28a4fff34e

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/bin/sh
        Arguments:n/a
        File size:4 bytes
        MD5 hash:e02ea3c3450d44126c46d658fa9e654c

        General

        Start time:17:52:35
        Start date:11/01/2022
        Path:/usr/share/apport/apport-gtk
        Arguments:/usr/bin/python3 /usr/share/apport/apport-gtk
        File size:23806 bytes
        MD5 hash:ec58a49a30ef6a29406a204f28cc7d87