Linux
Analysis Report
ouRv1FvRhf
Overview
General Information
Sample Name: | ouRv1FvRhf |
Analysis ID: | 660853 |
MD5: | f696b51a0b5f007998f8f2df0da3540b |
SHA1: | 849184e7d53c13b4592d0706e15bc94d29c3e8f0 |
SHA256: | efd350ccfbf13fb1db9dd5c71aaf1277ae2c181d0197d3e767b0f9241629939b |
Infos: |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Sample is potentially a Mirai botnet sample
Sample contains AV-related strings
Sample contains strings that are potentially command strings
Sample has stripped symbol table
Reads system information from the proc file system
Contains strings related to BOT control commands
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Sample and/or dropped files contains symbols with suspicious names
Sample listens on a socket
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Classification
Analysis Advice
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work. |
Joe Sandbox Version: | 35.0.0 Citrine |
Analysis ID: | 660853 |
Start date and time: 11/07/202210:52:08 | 2022-07-11 10:52:08 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 7m 12s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | ouRv1FvRhf |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal56.troj.evad.lin@0/17@0/0 |
- VT rate limit hit for: http://www.censura.infonew
Command: | /tmp/ouRv1FvRhf |
PID: | 6235 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: | [[34mINF[0m] Running SYN scan with CAP_NET_RAW privileges [[34mINF[0m] Port scan over,web scan starting |
- system is lnxubuntu20
- cleanup
⊘No yara matches
⊘No Snort rule has matched
- • AV Detection
- • Networking
- • DDoS
- • System Summary
- • Persistence and Installation Behavior
- • Malware Analysis System Evasion
- • Lowering of HIPS / PFW / Operating System Security Settings
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | ELF static info symbol of initial sample: | ||
Source: | ELF static info symbol of initial sample: | ||
Source: | ELF static info symbol of initial sample: | ||
Source: | ELF static info symbol of initial sample: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |