Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
botnt.mips.elf

Overview

General Information

Sample name:botnt.mips.elf
Analysis ID:1502198
MD5:a6049e382c42373b22a17cab856eece8
SHA1:c27cb58208e23d61c992cb748715bd8813c1432f
SHA256:c47f6e1fedbdb8ac6702be2e79ed705f0dacd344164085ef48f12fdaaedf652b
Tags:botntelf
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false

Signatures

Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502198
Start date and time:2024-08-31 14:44:15 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:botnt.mips.elf
Detection:CLEAN
Classification:clean2.linELF@0/0@1/0
Command:/tmp/botnt.mips.elf
PID:5524
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:Segmentation fault
  • system is lnxubuntu20
  • botnt.mips.elf (PID: 5524, Parent: 5447, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/botnt.mips.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: global trafficTCP traffic: 192.168.2.15:42452 -> 92.38.160.7:2222
Source: /tmp/botnt.mips.elf (PID: 5526)Socket: 127.0.0.1:2174Jump to behavior
Source: global trafficDNS traffic detected: DNS query: b.dvrinside.digital
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: clean2.linELF@0/0@1/0
Source: submitted sampleStderr: Segmentation fault: exit code = 0
Source: /tmp/botnt.mips.elf (PID: 5524)Queries kernel information via 'uname': Jump to behavior
Source: botnt.mips.elf, 5524.1.0000555fbcd7a000.0000555fbce01000.rw-.sdmpBinary or memory string: _U!/etc/qemu-binfmt/mips
Source: botnt.mips.elf, 5524.1.00007ffcd1293000.00007ffcd12b4000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/botnt.mips.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/botnt.mips.elf
Source: botnt.mips.elf, 5524.1.0000555fbcd7a000.0000555fbce01000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
Source: botnt.mips.elf, 5524.1.00007ffcd1293000.00007ffcd12b4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502198 Sample: botnt.mips.elf Startdate: 31/08/2024 Architecture: LINUX Score: 2 10 92.38.160.7, 2222, 42452 GCOREAT Austria 2->10 12 b.dvrinside.digital 2->12 6 botnt.mips.elf 2->6         started        process3 process4 8 botnt.mips.elf 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
b.dvrinside.digital
92.223.30.117
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    92.38.160.7
    unknownAustria
    199524GCOREATfalse
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    GCOREAThttp://techcrunchabc.homesGet hashmaliciousUnknownBrowse
    • 92.223.97.97
    https://eu5qwt3o.beauty/offer/4?imp=amakyvlljhftr1723918476202&rurl=https%3A%2F%2Fgentlyrevitalizedarchitect.com%2F%3Fa%3D103098%26c%3D143007%26s1%3D79%26s2%3Damakyvlljhftr1723918476202%26s3%3Dwww.foxnews.comGet hashmaliciousUnknownBrowse
    • 92.223.21.23
    https://fwealthm.comGet hashmaliciousUnknownBrowse
    • 92.223.127.156
    https://www.globalepic.co.kr/view.php?ud=202408011057515744edd3030223_29Get hashmaliciousUnknownBrowse
    • 92.38.168.190
    SLL8zVmaGj.elfGet hashmaliciousUnknownBrowse
    • 92.38.145.145
    cJTpn6cF6x.elfGet hashmaliciousUnknownBrowse
    • 92.38.145.126
    FcMd5XxxZ0.elfGet hashmaliciousMiraiBrowse
    • 5.8.68.127
    http://url7525.miamiadvisors.com/ls/click?upn=u001.wJ6z96nUyPZ-2FP3pZYKQ4grlWRA-2BI-2F1rqfNlBRYAOK617ycFr5ImTLyXCmxLJcv6yLgMV_ILgzAGh9pPX7AoSafK9Gs8M95O4IkW7nxJpWXnZg2bNLwLz1rEKfmulLU5eU2IirbR6maz-2FOZfMUy-2BVMayO5oF0VxEf9RkpuvjpEWS917JL-2FlEdZLcy0N2moO5kBZyyWhfQeoUYQPbgRy3uWBpJdT4j9-2F407DT7CERAfdu0Wr9UIAsPY80QOswLOO9LadRo7o9vTiRpEd3AFhdViJcbk78c3ObscDblx2YbYK370JiDJPOfWBXXkAUnEm2Wq1PAUFMy2RL1TLrpX-2BYOCyu7UVmosfks-2FJaeND37qWXN7DjKocYXqRw8VBcV-2FZ7Xg3jhU5i-2B-2FDbjqlm7brQEoCUMUF7jEkYCjnKmcLdnbXpPH40uORTZdzy7gL13vFbnK72rl0v05q1jJgNfU3GOafg1xS3KJXhmpkNx2tJEKjWveC9jHtKw8ToyuE8jCy2wmMEMNC8vwpFbJBhk3VFkb7Td02PVhoad-2BCAnQPF2zfzGH9Goj2yCsgv1q-2BY6ye6NIj2q-2BU3Z92rukjRCCduWWpPYw1CBSWRNYRPd5-2BNdjauwjm6cGkzjt8mEiiMOnPDGoqado8m6xxiX1UhT6mSHKSrtbCKh1BBWUObYrPHzLD38q9li2rTZzkBQDmIjJ6Z0vV0cU74Yu-2B7r3oIQRd5r3Ak6qWyLDqsZjmXneZ1H9YvUwSWayHYysIY8FbSfpiYd1-2BRgOweM89t0nlR2ZLjDPI5zSLLu-2FPeaTD-2BxJZEFIHsedZkjl1H7pjD-2B-2FpEmiC2KWlGRJXBJKvc2oEJOMug91loOprYIUMulBGJzHGpHAe9nq4-2B87dsS3cDnjA4MQYiXWyp-2FXhk5WFIxiGlR5IqHdGDHxUeU5UDGAHJgWMcGhkV2blFM-3DGet hashmaliciousUnknownBrowse
    • 92.223.97.97
    https://cutt.ly/Netz3TGLGet hashmaliciousUnknownBrowse
    • 92.223.124.62
    http://wwwlegals.comGet hashmaliciousUnknownBrowse
    • 92.223.124.62
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
    Entropy (8bit):5.596391893681229
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:botnt.mips.elf
    File size:101'316 bytes
    MD5:a6049e382c42373b22a17cab856eece8
    SHA1:c27cb58208e23d61c992cb748715bd8813c1432f
    SHA256:c47f6e1fedbdb8ac6702be2e79ed705f0dacd344164085ef48f12fdaaedf652b
    SHA512:7261160aedf26862e70cd60713ca268b2b61ae03ad3c0325f81051b328397263fb80584aad150cfa9115a49fb47c35f88bb20ee3fe672721d97d842e950b881c
    SSDEEP:1536:7JP3nbbbrb2PJKe9bn3k03QS03TtZDa3XQDWDCWys7koccDs5E8:hbbbofku3xC0UCs5E8
    TLSH:24A3C81E6D218FACF35D82344BF74B31A758239112E1C685D2BCD910AFA478E941FBB9
    File Content Preview:.ELF.....................@.p...4.........4. ...(.............@...@....}...}..................E...E.....0../D........dt.Q............................<...'......!'.......................<...'......!........'9... ......................<...'..h...!... ....'9c

    ELF header

    Class:ELF32
    Data:2's complement, big endian
    Version:1 (current)
    Machine:MIPS R3000
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - System V
    ABI Version:0
    Entry Point Address:0x400270
    Flags:0x1007
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:100756
    Section Header Size:40
    Number of Section Headers:14
    Header String Table Index:13
    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
    NULL0x00x00x00x00x0000
    .initPROGBITS0x4000940x940x8c0x00x6AX004
    .textPROGBITS0x4001200x1200x162a00x00x6AX0016
    .finiPROGBITS0x4163c00x163c00x5c0x00x6AX004
    .rodataPROGBITS0x4164200x164200x19b80x00x2A0016
    .eh_framePROGBITS0x4580000x180000x40x00x3WA004
    .ctorsPROGBITS0x4580040x180040x80x00x3WA004
    .dtorsPROGBITS0x45800c0x1800c0x80x00x3WA004
    .dataPROGBITS0x4580200x180200x33c0x00x3WA0016
    .gotPROGBITS0x4583600x183600x5d00x40x10000003WAp0016
    .sbssNOBITS0x4589300x189300x100x00x10000003WAp004
    .bssNOBITS0x4589400x189300x26040x00x3WA0016
    .mdebug.abi32PROGBITS0xd5c0x189300x00x00x0001
    .shstrtabSTRTAB0x00x189300x610x00x0001
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x4000000x4000000x17dd80x17dd85.63760x5R E0x10000.init .text .fini .rodata
    LOAD0x180000x4580000x4580000x9300x2f444.17840x6RW 0x10000.eh_frame .ctors .dtors .data .got .sbss .bss
    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 14:44:57.977932930 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:44:57.982906103 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:44:57.982964039 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:44:57.983098030 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:44:57.987860918 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:44:59.343413115 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:44:59.343528032 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:44:59.344031096 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:44:59.348794937 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:44:59.933099031 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:44:59.933310986 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:44:59.933311939 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:44:59.938363075 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:00.522711992 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:00.522849083 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:00.523493052 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:00.528238058 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:00.528304100 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:00.533082008 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:02.525976896 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:02.530874968 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:03.120105028 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:03.163630962 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:15.132867098 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:15.137679100 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:15.722050905 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:15.722203016 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:27.734719038 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:27.739636898 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:28.324533939 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:28.324595928 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:40.337105989 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:40.370146036 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:40.979182005 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:40.979309082 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:52.991506100 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:45:53.041887045 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:53.646502972 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:45:53.646600008 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:05.658615112 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:05.877692938 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:05.908473969 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:06.511656046 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:06.511985064 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:06.728408098 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:06.728574991 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:07.119286060 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:07.119452953 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:07.536540031 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:07.536762953 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:08.284392118 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:08.284527063 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:18.523983955 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:18.749294996 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:19.185329914 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:19.218823910 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:19.824538946 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:19.824692965 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:31.837024927 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:32.060883999 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:32.284895897 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:32.752852917 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:33.648824930 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:33.653866053 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:34.240385056 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:34.240659952 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:44.251044035 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:44.259933949 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:44.844228983 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:44.844346046 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:56.856137991 CEST424522222192.168.2.1592.38.160.7
    Aug 31, 2024 14:46:56.861042023 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:57.445460081 CEST22224245292.38.160.7192.168.2.15
    Aug 31, 2024 14:46:57.445749998 CEST424522222192.168.2.1592.38.160.7
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 14:44:57.958403111 CEST4875253192.168.2.158.8.8.8
    Aug 31, 2024 14:44:57.969532967 CEST53487528.8.8.8192.168.2.15
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 31, 2024 14:44:57.958403111 CEST192.168.2.158.8.8.80x4f20Standard query (0)b.dvrinside.digitalA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital92.223.30.117A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital5.8.33.179A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital95.85.78.19A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital92.38.160.7A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital172.236.61.194A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital194.147.35.196A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital94.103.91.233A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital104.237.135.234A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital139.162.84.81A (IP address)IN (0x0001)false
    Aug 31, 2024 14:44:57.969532967 CEST8.8.8.8192.168.2.150x4f20No error (0)b.dvrinside.digital194.190.152.176A (IP address)IN (0x0001)false

    System Behavior

    Start time (UTC):12:44:56
    Start date (UTC):31/08/2024
    Path:/tmp/botnt.mips.elf
    Arguments:/tmp/botnt.mips.elf
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:44:56
    Start date (UTC):31/08/2024
    Path:/tmp/botnt.mips.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c