Linux Analysis Report
bootnoot.mpsl.elf

Overview

General Information

Sample name: bootnoot.mpsl.elf
Analysis ID: 1502195
MD5: 27ee7e0f025ef04260400c8598954ae1
SHA1: f07806406746cdace09e47fe13bb6184bc71c6c1
SHA256: 339346d56f430dbaa0f3da5485f6a64799f3eebfecee09c69b4de70dd9c5ada1
Tags: bootnootelf
Infos:

Detection

Score: 3
Range: 0 - 100
Whitelisted: false

Signatures

Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sleeps for long times indicative of sandbox evasion
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Source: /tmp/bootnoot.mpsl.elf (PID: 6214) Socket: 127.0.0.1:2174 Jump to behavior
Source: ELF static info symbol of initial sample .symtab present: no
Source: /tmp/bootnoot.mpsl.elf (PID: 6313) SIGKILL sent: pid: 6311, result: successful Jump to behavior
Source: classification engine Classification label: clean3.linELF@0/317@0/0
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1582/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1582/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/3088/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/3088/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/230/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/230/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/110/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/231/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/231/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/111/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/232/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/232/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1579/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1579/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/112/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/233/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/233/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1699/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1699/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/113/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/234/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/234/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1335/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1335/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1698/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1698/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/114/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/235/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1334/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1334/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1576/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1576/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/2302/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/2302/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/115/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/236/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/236/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/116/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/237/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/237/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/117/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/118/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/910/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/910/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/119/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/119/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/912/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/912/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/10/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/10/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/2307/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/2307/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/11/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/11/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/918/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/918/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/12/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/12/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/13/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/13/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/14/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/14/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/15/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/15/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/16/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/16/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/17/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/17/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/18/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/18/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1594/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1594/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/120/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/120/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/121/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/121/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1349/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1349/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/1/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/122/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/122/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/243/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/243/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/123/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/123/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/2/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/2/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/124/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/124/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/3/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/3/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/4/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/4/cmdline Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/125/maps Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6236) File opened: /proc/125/cmdline Jump to behavior
Source: /usr/bin/dash (PID: 6193) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Wdu7CaX6TB /tmp/tmp.AvdmjSKmoj /tmp/tmp.N2YbCeqrg5 Jump to behavior
Source: /usr/bin/dash (PID: 6194) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Wdu7CaX6TB /tmp/tmp.AvdmjSKmoj /tmp/tmp.N2YbCeqrg5 Jump to behavior
Source: submitted sample Stderr: Segmentation fault: exit code = 0
Source: /tmp/bootnoot.mpsl.elf (PID: 6313) Sleeps longer then 60s: 60.0s Jump to behavior
Source: /tmp/bootnoot.mpsl.elf (PID: 6211) Queries kernel information via 'uname': Jump to behavior
Source: bootnoot.mpsl.elf, 6211.1.000055a805501000.000055a8055a8000.rw-.sdmp, bootnoot.mpsl.elf, 6311.1.000055a805501000.000055a805588000.rw-.sdmp, bootnoot.mpsl.elf, 6313.1.000055a805501000.000055a805588000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mipsel
Source: bootnoot.mpsl.elf, 6211.1.000055a805501000.000055a8055a8000.rw-.sdmp, bootnoot.mpsl.elf, 6311.1.000055a805501000.000055a805588000.rw-.sdmp, bootnoot.mpsl.elf, 6313.1.000055a805501000.000055a805588000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/mipsel
Source: bootnoot.mpsl.elf, 6211.1.00007ffd1f06c000.00007ffd1f08d000.rw-.sdmp, bootnoot.mpsl.elf, 6311.1.00007ffd1f06c000.00007ffd1f08d000.rw-.sdmp, bootnoot.mpsl.elf, 6313.1.00007ffd1f06c000.00007ffd1f08d000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/bootnoot.mpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/bootnoot.mpsl.elf
Source: bootnoot.mpsl.elf, 6211.1.00007ffd1f06c000.00007ffd1f08d000.rw-.sdmp, bootnoot.mpsl.elf, 6311.1.00007ffd1f06c000.00007ffd1f08d000.rw-.sdmp, bootnoot.mpsl.elf, 6313.1.00007ffd1f06c000.00007ffd1f08d000.rw-.sdmp Binary or memory string: /usr/bin/qemu-mipsel
No contacted IP infos