Linux
Analysis Report
bK4ifMYnru
Overview
General Information
Sample Name: | bK4ifMYnru |
Analysis ID: | 724411 |
MD5: | 15117239e7ac254c0c6422367be82534 |
SHA1: | cfd16b6126f8796156681aa99bfd4a32638209e9 |
SHA256: | 978c260f3ba54c06141eed810a59ae56cbbcf19971dd80d3331f61eb8e69d2c6 |
Infos: |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Reads system information from the proc file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Classification
Analysis Advice
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work. |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 724411 |
Start date and time: | 2022-10-17 13:54:11 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | bK4ifMYnru |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Run name: | Potential for more IOCs and behavior |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal60.spre.lin@0/0@0/0 |
- VT rate limit hit for: http://grub.org)request
- VT rate limit hit for: http://wiki.peiqi.tech/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v11.7%20auth_mobi.php%20%
- VT rate limit hit for: https://docs.min.io/cn/
Command: | /tmp/bK4ifMYnru |
PID: | 6232 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | Host is none |
Standard Error: | ___ _ / _ \ ___ ___ _ __ __ _ ___| | __ / /_\/____/ __|/ __| '__/ _` |/ __| |/ / / /_\\_____\__ \ (__| | | (_| | (__| < \____/ |___/\___|_| \__,_|\___|_|\_\ fscan version: 1.8.1 Usage of /tmp/bK4ifMYnru: -br int Brute threads (default 1) -c string exec command (ssh) -cookie string set poc cookie,-cookie rememberMe=login -debug int every time to LogErr (default 60) -domain string smb domain -full poc full scan,as: shiro 100 key -h string IP address of the host you want to scan,for example: 192.168.11.11 | 192.168.11.11-255 | 192.168.11.11,192.168.11.12 -hf string host file, -hf ip.txt -hn string the hosts no scan,as: -hn 192.168.1.1/24 -m string Select scan type ,as: -m ssh (default "all") -no not to save output log -nobr not to Brute password -nopoc not to scan web vul -np not to ping -nuclei use nuclei poc -num int poc rate (default 20) -o string Outputfile (default "result.txt") -p string Select a port,for example: 22 | 1-65535 | 22,80,3306 (default "21,22,80,81,135,139,443,445,1433,1521,3306,5432,6379,7001,8000,8080,8089,9000,9200,11211,27017") -pa string add port base DefaultPorts,-pa 3389 -path string fcgismb romote file path -ping using ping replace icmp -pn string the ports no scan,as: -pn 445 -pocname string use the pocs these contain pocname, -pocname weblogic -pocpath string poc file path -portf string Port File -proxy string set poc proxy, -proxy http://127.0.0.1:8080 -pwd string password -pwda string add a password base DefaultPasses,-pwda password -pwdf string password file -rf string redis file to write sshkey file (as: -rf id_rsa.pub) -rs string redis shell to write cron file (as: -rs 192.168.1.1:6666) -sc string ms17 shellcode,as -sc add -silent silent scan -socks5 string set socks5 proxy, will be used in tcp connection, timeout setting will not work -sshkey string sshkey file (id_rsa) -t int Thread nums (default 600) -template string Template file or template path -time int Set timeout (default 3) -top int show live len top (default 10) -u string url -uf string urlfile -user string username -usera string add a user base DefaultUsers,-usera user -userf string username file -wt int Set web timeout (default 5) |
- system is lnxubuntu20
- cleanup
⊘No yara matches
⊘No Snort rule has matched
- • AV Detection
- • Spreading
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Malware Analysis System Evasion
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Spreading |
---|
Source: | String: |