Edit tour
Linux
Analysis Report
index
Overview
General Information
Sample Name: | index |
Analysis ID: | 881271 |
MD5: | 3a2d1ab69281a2ed28dd9dbeac4a3a90 |
SHA1: | 34e8b29be74ec982fd9d6dce5ca87bc1a7184efe |
SHA256: | f876b9a14d9770212b2dea07d2f2f093be8825de4e13bacb68f49ab29bfd8ca6 |
Infos: |
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Malicious sample detected (through community Yara rule)
Sample deletes itself
Sample contains AV-related strings
Found Tor onion address
Connects to many ports of the same IP (likely port scanning)
May check the online IP address of the machine
Yara signature match
Sample contains strings that are potentially command strings
Sample has stripped symbol table
HTTP GET or POST without a user agent
Reads system information from the proc file system
Uses the "uname" system call to query kernel version information (possible evasion)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Classification
Analysis Advice
Static ELF header machine description suggests that the sample might not execute correctly on this machine. |
Joe Sandbox Version: | 37.1.0 Beryl |
Analysis ID: | 881271 |
Start date and time: | 2023-06-03 23:15:29 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 7m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample file name: | index |
Detection: | MAL |
Classification: | mal68.troj.evad.lin@0/3@2/0 |
Command: | /tmp/index |
PID: | 6231 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | Jun 03 23:16:18.367 [notice] Tor 0.4.6.8-dev running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2f, Zlib 1.2.11, Liblzma N/A, Libzstd N/A and Unknown N/A as libc. Jun 03 23:16:18.371 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Jun 03 23:16:18.380 [notice] Read configuration file "./.torrc". Jun 03 23:16:18.384 [notice] Setting tor listening on port 20745. Jun 03 23:16:18.387 [notice] Configuration file "/root/.torrc" not present, using reasonable defaults. Jun 03 23:16:18.436 [warn] You specified a public address '0.0.0.0:94' for SocksPort. Other people on the Internet might find your computer and use it as an open proxy. Please don't allow this unless you have a good reason. Jun 03 23:16:18.443 [notice] Opening Socks listener on 0.0.0.0:20745 Jun 03 23:16:18.451 [notice] Opened Socks listener connection (ready) on 0.0.0.0:20745 Jun 03 23:16:18.000 [warn] You are running Tor as root. You don't need to, and you probably shouldn't. Jun 03 23:16:18.000 [notice] We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST P-224 and P-256 groups. Building openssl with such support (using the enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH much faster. Jun 03 23:16:18.000 [notice] Bootstrapped 0% (starting): Starting Jun 03 23:16:18.000 [notice] Starting with guard context "default" Jun 03 23:16:19.000 [notice] Bootstrapped 5% (conn): Connecting to a relay Jun 03 23:16:19.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay |
Standard Error: |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_ELF_Tor_Client | Detects VPNFilter malware | Florian Roth (Nextron Systems) |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_ELF_Tor_Client | Detects VPNFilter malware | Florian Roth (Nextron Systems) |
| |
SUSP_ELF_Tor_Client | Detects VPNFilter malware | Florian Roth (Nextron Systems) |
|
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |