Linux Analysis Report
botnt.armv7v5.elf

Overview

General Information

Sample name: botnt.armv7v5.elf
Analysis ID: 1502199
MD5: 220d50d51a92a8fe2a109fc6a92de91b
SHA1: 4168b3819ad07c57c6d74006e06a3808ed8b3aa7
SHA256: 1e31df3c8fc2d8fe28fa013f1e69763de76d6792d89a2c75e557926a973659ac
Tags: botntelf
Infos:

Detection

Score: 2
Range: 0 - 100
Whitelisted: false

Signatures

Sample has stripped symbol table
Sample listens on a socket
Sleeps for long times indicative of sandbox evasion
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Source: /tmp/botnt.armv7v5.elf (PID: 5495) Socket: 127.0.0.1:2174 Jump to behavior
Source: botnt.armv7v5.elf String found in binary or memory: https://www.gnu.org/software/libc/bugs.html
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: clean2.linELF@0/0@0/0
Source: submitted sample Stderr: Segmentation fault: exit code = 0
Source: /tmp/botnt.armv7v5.elf (PID: 5561) Sleeps longer then 60s: 60.0s Jump to behavior
Source: /tmp/botnt.armv7v5.elf (PID: 5493) Queries kernel information via 'uname': Jump to behavior
Source: botnt.armv7v5.elf, 5493.1.00007fff1dff9000.00007fff1e01a000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/botnt.armv7v5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/botnt.armv7v5.elf
Source: botnt.armv7v5.elf, 5493.1.00005567f1d08000.00005567f1e58000.rw-.sdmp Binary or memory string: gU!/etc/qemu-binfmt/arm
Source: botnt.armv7v5.elf, 5493.1.00005567f1d08000.00005567f1e58000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: botnt.armv7v5.elf, 5493.1.00007fff1dff9000.00007fff1e01a000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
No contacted IP infos