Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
HB2h7DKsXn.elf

Overview

General Information

Sample name:HB2h7DKsXn.elf
renamed because original name is a hash value
Original sample name:8e85cb6f2215999dc6823ea3982ff4376c2cbea53286e95ed00250a4a2fe4729.elf
Analysis ID:1501617
MD5:e527b3f10217c1d663e567e041947033
SHA1:168d8c11681ac4f59f335688b21ef7ffb83bc84d
SHA256:8e85cb6f2215999dc6823ea3982ff4376c2cbea53286e95ed00250a4a2fe4729
Tags:45-91-82-127Bifrostelf
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sleeps for long times indicative of sandbox evasion
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501617
Start date and time:2024-08-30 08:37:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 11s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:HB2h7DKsXn.elf
renamed because original name is a hash value
Original Sample Name:8e85cb6f2215999dc6823ea3982ff4376c2cbea53286e95ed00250a4a2fe4729.elf
Detection:MAL
Classification:mal56.linELF@0/0@2/0
Command:/tmp/HB2h7DKsXn.elf
PID:6233
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 6196, Parent: 4331)
  • rm (PID: 6196, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.kez7MmyFty /tmp/tmp.9HED5QhUTD /tmp/tmp.RYTmACJWEm
  • dash New Fork (PID: 6197, Parent: 4331)
  • rm (PID: 6197, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.kez7MmyFty /tmp/tmp.9HED5QhUTD /tmp/tmp.RYTmACJWEm
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: HB2h7DKsXn.elfAvira: detected
Source: HB2h7DKsXn.elfVirustotal: Detection: 61%Perma Link
Source: HB2h7DKsXn.elfReversingLabs: Detection: 73%
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownDNS traffic detected: query: download.vmfare.com replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownUDP traffic detected without corresponding DNS query: 168.95.1.1
Source: global trafficDNS traffic detected: DNS query: download.vmfare.com
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.linELF@0/0@2/0
Source: /usr/bin/dash (PID: 6196)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.kez7MmyFty /tmp/tmp.9HED5QhUTD /tmp/tmp.RYTmACJWEmJump to behavior
Source: /usr/bin/dash (PID: 6197)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.kez7MmyFty /tmp/tmp.9HED5QhUTD /tmp/tmp.RYTmACJWEmJump to behavior
Source: /tmp/HB2h7DKsXn.elf (PID: 6235)Sleeps longer then 60s: 300.0sJump to behavior
Source: /tmp/HB2h7DKsXn.elf (PID: 6233)Queries kernel information via 'uname': Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1501617 Sample: HB2h7DKsXn.elf Startdate: 30/08/2024 Architecture: LINUX Score: 56 16 109.202.202.202, 80 INIT7CH Switzerland 2->16 18 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->18 20 2 other IPs or domains 2->20 22 Antivirus / Scanner detection for submitted sample 2->22 24 Multi AV Scanner detection for submitted file 2->24 8 dash rm HB2h7DKsXn.elf 2->8         started        10 dash rm 2->10         started        signatures3 process4 process5 12 HB2h7DKsXn.elf 8->12         started        process6 14 HB2h7DKsXn.elf 12->14         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
HB2h7DKsXn.elf62%VirustotalBrowse
HB2h7DKsXn.elf74%ReversingLabsLinux.Trojan.Multiverze
HB2h7DKsXn.elf100%AviraLINUX/AVA.Agent.vqxpp
No Antivirus matches
SourceDetectionScannerLabelLink
download.vmfare.com13%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
download.vmfare.com
unknown
unknownfalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
91.189.91.43sora.arm6.elfGet hashmaliciousMiraiBrowse
    checklist.elfGet hashmaliciousUnknownBrowse
      bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
        SecuriteInfo.com.Linux.Siggen.9999.7103.25979.elfGet hashmaliciousMiraiBrowse
          SecuriteInfo.com.Android.Banker.5117.19232.32315.elfGet hashmaliciousUnknownBrowse
            lockton.exe.elfGet hashmaliciousUnknownBrowse
              HsGTBFS78E.elfGet hashmaliciousSliverBrowse
                criptonize.armv7l.elfGet hashmaliciousUnknownBrowse
                  KwSb7C8Rpy.elfGet hashmaliciousUnknownBrowse
                    bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      91.189.91.42sora.arm6.elfGet hashmaliciousMiraiBrowse
                        checklist.elfGet hashmaliciousUnknownBrowse
                          bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                            SecuriteInfo.com.Linux.Siggen.9999.7103.25979.elfGet hashmaliciousMiraiBrowse
                              SecuriteInfo.com.Android.Banker.5117.19232.32315.elfGet hashmaliciousUnknownBrowse
                                lockton.exe.elfGet hashmaliciousUnknownBrowse
                                  HsGTBFS78E.elfGet hashmaliciousSliverBrowse
                                    criptonize.mips64.elfGet hashmaliciousUnknownBrowse
                                      criptonize.armv7l.elfGet hashmaliciousUnknownBrowse
                                        KwSb7C8Rpy.elfGet hashmaliciousUnknownBrowse
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CANONICAL-ASGBsora.arm6.elfGet hashmaliciousMiraiBrowse
                                          • 91.189.91.42
                                          checklist.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 91.189.91.42
                                          SecuriteInfo.com.Linux.Siggen.9999.7103.25979.elfGet hashmaliciousMiraiBrowse
                                          • 91.189.91.42
                                          SecuriteInfo.com.Android.Banker.5117.19232.32315.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          lockton.exe.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          HsGTBFS78E.elfGet hashmaliciousSliverBrowse
                                          • 91.189.91.42
                                          criptonize.i486.elfGet hashmaliciousUnknownBrowse
                                          • 185.125.190.26
                                          criptonize.mips64.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          criptonize.armv7l.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          CANONICAL-ASGBsora.arm6.elfGet hashmaliciousMiraiBrowse
                                          • 91.189.91.42
                                          checklist.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 91.189.91.42
                                          SecuriteInfo.com.Linux.Siggen.9999.7103.25979.elfGet hashmaliciousMiraiBrowse
                                          • 91.189.91.42
                                          SecuriteInfo.com.Android.Banker.5117.19232.32315.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          lockton.exe.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          HsGTBFS78E.elfGet hashmaliciousSliverBrowse
                                          • 91.189.91.42
                                          criptonize.i486.elfGet hashmaliciousUnknownBrowse
                                          • 185.125.190.26
                                          criptonize.mips64.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          criptonize.armv7l.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          INIT7CHsora.arm6.elfGet hashmaliciousMiraiBrowse
                                          • 109.202.202.202
                                          checklist.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 109.202.202.202
                                          SecuriteInfo.com.Linux.Siggen.9999.7103.25979.elfGet hashmaliciousMiraiBrowse
                                          • 109.202.202.202
                                          SecuriteInfo.com.Android.Banker.5117.19232.32315.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          lockton.exe.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          HsGTBFS78E.elfGet hashmaliciousSliverBrowse
                                          • 109.202.202.202
                                          criptonize.mips64.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          criptonize.armv7l.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          KwSb7C8Rpy.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, for GNU/Linux 2.2.5, stripped
                                          Entropy (8bit):6.210090267696106
                                          TrID:
                                          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                          File name:HB2h7DKsXn.elf
                                          File size:453'668 bytes
                                          MD5:e527b3f10217c1d663e567e041947033
                                          SHA1:168d8c11681ac4f59f335688b21ef7ffb83bc84d
                                          SHA256:8e85cb6f2215999dc6823ea3982ff4376c2cbea53286e95ed00250a4a2fe4729
                                          SHA512:418b464ec0b939a06ae0f0b3daff5f59ff267bbd3cc77d41fe91aaa616fef333c8a6a3fa0c612d8f505fab2a1fda19817b709444799807cd461361fc6d64db64
                                          SSDEEP:12288:FtM4Cy+joOAVz8pAHcCf3LL2ecCEU8/1SQLjdAE2u8OJuVmC4zcsT8J:bM4Cy+sdKpVCfv0CEU8/1SQLjdAEV8Ok
                                          TLSH:D8A48C07F690E462C01202B02349EA725674FB328123CAC7BBD52FADAD755E2B71E717
                                          File Content Preview:.ELF........................4...........4. ...(..............................................0...0..tD..0Z.......................... ... ...........Q.td........................................GNU.................U......E..........L........................

                                          ELF header

                                          Class:ELF32
                                          Data:2's complement, little endian
                                          Version:1 (current)
                                          Machine:Intel 80386
                                          Version Number:0x1
                                          Type:EXEC (Executable file)
                                          OS/ABI:UNIX - System V
                                          ABI Version:0
                                          Entry Point Address:0x8048100
                                          Flags:0x0
                                          ELF Header Size:52
                                          Program Header Offset:52
                                          Program Header Size:32
                                          Number of Program Headers:4
                                          Section Header Offset:452828
                                          Section Header Size:40
                                          Number of Section Headers:21
                                          Header String Table Index:20
                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                          NULL0x00x00x00x00x0000
                                          .initPROGBITS0x80480d40xd40x170x00x6AX004
                                          .textPROGBITS0x80481000x1000x54fe10x00x6AX0032
                                          __libc_thread_freeres_fnPROGBITS0x809d0e40x550e40xdc0x00x6AX004
                                          __libc_freeres_fnPROGBITS0x809d1c00x551c00x58c0x00x6AX004
                                          .finiPROGBITS0x809d74c0x5574c0x1b0x00x6AX004
                                          .rodataPROGBITS0x809d7800x557800x12a320x00x2A0032
                                          __libc_atexitPROGBITS0x80b01b40x681b40x40x00x2A004
                                          __libc_subfreeresPROGBITS0x80b01b80x681b80x340x00x2A004
                                          __libc_thread_subfreeresPROGBITS0x80b01ec0x681ec0x40x00x2A004
                                          .eh_framePROGBITS0x80b01f00x681f00x1e980x00x2A004
                                          .dataPROGBITS0x80b30a00x6a0a00x444c0x00x3WA0032
                                          .ctorsPROGBITS0x80b74ec0x6e4ec0xc0x00x3WA004
                                          .dtorsPROGBITS0x80b74f80x6e4f80x80x00x3WA004
                                          .jcrPROGBITS0x80b75000x6e5000x40x00x3WA004
                                          .gotPROGBITS0x80b75040x6e5040x100x40x3WA004
                                          .bssNOBITS0x80b75200x6e5200x415940x00x3WA0032
                                          __libc_freeres_ptrsNOBITS0x80f8ab40x6e5200x1c0x00x3WA004
                                          .commentPROGBITS0x00x6e5200x2d80x00x0001
                                          .note.ABI-tagNOTE0x80480b40xb40x200x00x2A004
                                          .shstrtabSTRTAB0x00x6e7f80xe10x00x0001
                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                          LOAD0x00x80480000x80480000x6a0880x6a0886.33180x5R E0x1000.init .text __libc_thread_freeres_fn __libc_freeres_fn .fini .rodata __libc_atexit __libc_subfreeres __libc_thread_subfreeres .eh_frame .note.ABI-tag
                                          LOAD0x6a0a00x80b30a00x80b30a00x44740x45a301.59660x6RW 0x1000.data .ctors .dtors .jcr .got .bss __libc_freeres_ptrs
                                          NOTE0xb40x80480b40x80480b40x200x201.68620x4R 0x4.note.ABI-tag
                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                          TimestampSource PortDest PortSource IPDest IP
                                          Aug 30, 2024 08:37:43.254986048 CEST43928443192.168.2.2391.189.91.42
                                          Aug 30, 2024 08:37:48.630388021 CEST42836443192.168.2.2391.189.91.43
                                          Aug 30, 2024 08:37:50.422142029 CEST4251680192.168.2.23109.202.202.202
                                          Aug 30, 2024 08:38:04.244178057 CEST43928443192.168.2.2391.189.91.42
                                          Aug 30, 2024 08:38:14.482772112 CEST42836443192.168.2.2391.189.91.43
                                          Aug 30, 2024 08:38:20.625818014 CEST4251680192.168.2.23109.202.202.202
                                          Aug 30, 2024 08:38:45.198436022 CEST43928443192.168.2.2391.189.91.42
                                          Aug 30, 2024 08:39:05.675646067 CEST42836443192.168.2.2391.189.91.43
                                          TimestampSource PortDest PortSource IPDest IP
                                          Aug 30, 2024 08:37:41.169395924 CEST5236553192.168.2.23168.95.1.1
                                          Aug 30, 2024 08:37:41.477412939 CEST5352365168.95.1.1192.168.2.23
                                          Aug 30, 2024 08:37:41.477648973 CEST5616853192.168.2.238.8.8.8
                                          Aug 30, 2024 08:37:41.505229950 CEST53561688.8.8.8192.168.2.23
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Aug 30, 2024 08:37:41.169395924 CEST192.168.2.23168.95.1.10x6745Standard query (0)download.vmfare.comA (IP address)IN (0x0001)false
                                          Aug 30, 2024 08:37:41.477648973 CEST192.168.2.238.8.8.80xc623Standard query (0)download.vmfare.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Aug 30, 2024 08:37:41.477412939 CEST168.95.1.1192.168.2.230x6745Name error (3)download.vmfare.comnonenoneA (IP address)IN (0x0001)false
                                          Aug 30, 2024 08:37:41.505229950 CEST8.8.8.8192.168.2.230xc623Name error (3)download.vmfare.comnonenoneA (IP address)IN (0x0001)false

                                          System Behavior

                                          Start time (UTC):06:37:35
                                          Start date (UTC):30/08/2024
                                          Path:/usr/bin/dash
                                          Arguments:-
                                          File size:129816 bytes
                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                          Start time (UTC):06:37:35
                                          Start date (UTC):30/08/2024
                                          Path:/usr/bin/rm
                                          Arguments:rm -f /tmp/tmp.kez7MmyFty /tmp/tmp.9HED5QhUTD /tmp/tmp.RYTmACJWEm
                                          File size:72056 bytes
                                          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                          Start time (UTC):06:37:35
                                          Start date (UTC):30/08/2024
                                          Path:/usr/bin/dash
                                          Arguments:-
                                          File size:129816 bytes
                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                          Start time (UTC):06:37:35
                                          Start date (UTC):30/08/2024
                                          Path:/usr/bin/rm
                                          Arguments:rm -f /tmp/tmp.kez7MmyFty /tmp/tmp.9HED5QhUTD /tmp/tmp.RYTmACJWEm
                                          File size:72056 bytes
                                          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                          Start time (UTC):06:37:40
                                          Start date (UTC):30/08/2024
                                          Path:/tmp/HB2h7DKsXn.elf
                                          Arguments:/tmp/HB2h7DKsXn.elf
                                          File size:453668 bytes
                                          MD5 hash:e527b3f10217c1d663e567e041947033

                                          Start time (UTC):06:37:40
                                          Start date (UTC):30/08/2024
                                          Path:/tmp/HB2h7DKsXn.elf
                                          Arguments:-
                                          File size:453668 bytes
                                          MD5 hash:e527b3f10217c1d663e567e041947033

                                          Start time (UTC):06:37:40
                                          Start date (UTC):30/08/2024
                                          Path:/tmp/HB2h7DKsXn.elf
                                          Arguments:-
                                          File size:453668 bytes
                                          MD5 hash:e527b3f10217c1d663e567e041947033