Linux Analysis Report
botnt.arm7.elf

Overview

General Information

Sample name: botnt.arm7.elf
Analysis ID: 1502200
MD5: 97ef72e9f5e8a8b12ded9b6e22bc0672
SHA1: 31bd62fe2554ebed242986e7576f74c510370c46
SHA256: a80d1ad56de4e4bd29e79065e05a692459e72c1d6ef3097ece98620c975e1cd2
Tags: botntelf
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: botnt.arm7.elf ReversingLabs: Detection: 18%
Source: global traffic TCP traffic: 192.168.2.23:44774 -> 95.85.78.2:6969
Source: /tmp/botnt.arm7.elf (PID: 6296) Socket: 127.0.0.1:2174 Jump to behavior
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: global traffic DNS traffic detected: DNS query: c.francoanddosbot.fun
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal48.linELF@0/0@1/0
Source: /usr/bin/dash (PID: 6260) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.1YvvdxWDCb /tmp/tmp.LxoRQpWOAW /tmp/tmp.Fvxx9mpQsR Jump to behavior
Source: /usr/bin/dash (PID: 6269) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.1YvvdxWDCb /tmp/tmp.LxoRQpWOAW /tmp/tmp.Fvxx9mpQsR Jump to behavior
Source: submitted sample Stderr: Segmentation fault: exit code = 0
Source: /tmp/botnt.arm7.elf (PID: 6293) Queries kernel information via 'uname': Jump to behavior
Source: botnt.arm7.elf, 6293.1.00007ffd601d1000.00007ffd601f2000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/botnt.arm7.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/botnt.arm7.elf
Source: botnt.arm7.elf, 6293.1.000055c5f0840000.000055c5f098e000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: botnt.arm7.elf, 6293.1.000055c5f0840000.000055c5f098e000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: botnt.arm7.elf, 6293.1.00007ffd601d1000.00007ffd601f2000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs