Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
botnt.arm.elf

Overview

General Information

Sample name:botnt.arm.elf
Analysis ID:1502202
MD5:577214e9f3b00a131409acb664845be3
SHA1:c4ff9f3effbc06994eccf27e2e1ff4262def762d
SHA256:2df45b61b0799febaa0ac067def9d00ffd4102fd4d7ab1ddd348470f36a011ca
Tags:botntelf
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502202
Start date and time:2024-08-31 14:48:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:botnt.arm.elf
Detection:MAL
Classification:mal48.linELF@0/0@1/0
Command:/tmp/botnt.arm.elf
PID:5542
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:Segmentation fault
  • system is lnxubuntu20
  • botnt.arm.elf (PID: 5542, Parent: 5462, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/botnt.arm.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: botnt.arm.elfReversingLabs: Detection: 13%
Source: global trafficTCP traffic: 192.168.2.14:55708 -> 95.85.78.19:3333
Source: /tmp/botnt.arm.elf (PID: 5544)Socket: 127.0.0.1:2174Jump to behavior
Source: global trafficDNS traffic detected: DNS query: a.cookiedough.lol
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/0@1/0
Source: submitted sampleStderr: Segmentation fault: exit code = 0
Source: /tmp/botnt.arm.elf (PID: 5542)Queries kernel information via 'uname': Jump to behavior
Source: botnt.arm.elf, 5542.1.00007ffe6adbd000.00007ffe6adde000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/botnt.arm.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/botnt.arm.elf
Source: botnt.arm.elf, 5542.1.000055607a473000.000055607a5c1000.rw-.sdmpBinary or memory string: Hz`U!/etc/qemu-binfmt/arm
Source: botnt.arm.elf, 5542.1.000055607a473000.000055607a5c1000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: botnt.arm.elf, 5542.1.00007ffe6adbd000.00007ffe6adde000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
botnt.arm.elf13%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
a.cookiedough.lol
95.85.78.19
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    95.85.78.19
    a.cookiedough.lolRussian Federation
    8749REDCOM-ASRedcomKhabarovskRussiaRUfalse
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    REDCOM-ASRedcomKhabarovskRussiaRUpWf4oPGBv2.elfGet hashmaliciousMiraiBrowse
    • 212.19.0.216
    qCgtVyWfS6.elfGet hashmaliciousMiraiBrowse
    • 212.19.0.214
    OVaDIUarkm.exeGet hashmaliciousAmadey, Healer AV Disabler, RedLineBrowse
    • 193.233.20.14
    ekevL8v2mi.exeGet hashmaliciousAmadey, Healer AV Disabler, RedLineBrowse
    • 193.233.20.14
    vJSyCK4is2.elfGet hashmaliciousMiraiBrowse
    • 212.19.25.242
    flB6ygLzMc.elfGet hashmaliciousMiraiBrowse
    • 212.19.0.220
    McB3sSkr3I.exeGet hashmaliciousSystemBCBrowse
    • 193.233.21.140
    2E0g3oH1wu.exeGet hashmaliciousPureLog Stealer, RHADAMANTHYSBrowse
    • 193.233.20.113
    Cdrip.dllGet hashmaliciousUnknownBrowse
    • 79.133.110.154
    Cdrip.dllGet hashmaliciousUnknownBrowse
    • 79.133.110.154
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
    Entropy (8bit):6.129618429833592
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:botnt.arm.elf
    File size:79'200 bytes
    MD5:577214e9f3b00a131409acb664845be3
    SHA1:c4ff9f3effbc06994eccf27e2e1ff4262def762d
    SHA256:2df45b61b0799febaa0ac067def9d00ffd4102fd4d7ab1ddd348470f36a011ca
    SHA512:f51ef96c113d1df87c210f8ed241e2f9ee4f4aed4b7e43dcd8e5f3420e8f1520aec347ff874355e1810c9201e9514aa8e7b4e75fd59d38a102a5dfa869cf0e43
    SSDEEP:1536:TjiQ1x4MvlJyL8j09curvcgvucS+eZwo6ZF32tUJY2Jfsz6vsQP:/5vNdJy4A9dbcgvtpgzSF32tYY2JfXsQ
    TLSH:BB734B85FC818F52C5E512BBFA5E418D372763A8D2EB33028D29AF6123C756B1E3B541
    File Content Preview:.ELF...a..........(.........4....3......4. ...(......................0...0...............0...0...0.......(..........Q.td..................................-...L."....F..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

    ELF header

    Class:ELF32
    Data:2's complement, little endian
    Version:1 (current)
    Machine:ARM
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:ARM - ABI
    ABI Version:0
    Entry Point Address:0x8190
    Flags:0x202
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:78720
    Section Header Size:40
    Number of Section Headers:12
    Header String Table Index:11
    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
    NULL0x00x00x00x00x0000
    .initPROGBITS0x80940x940x180x00x6AX004
    .textPROGBITS0x80b00xb00x11ad80x00x6AX0016
    .finiPROGBITS0x19b880x11b880x140x00x6AX004
    .rodataPROGBITS0x19b9c0x11b9c0x14680x00x2A004
    .eh_framePROGBITS0x230040x130040x40x00x3WA004
    .ctorsPROGBITS0x230080x130080x80x00x3WA004
    .dtorsPROGBITS0x230100x130100x80x00x3WA004
    .dataPROGBITS0x2301c0x1301c0x2fc0x00x3WA004
    .bssNOBITS0x233180x133180x25b40x00x3WA004
    .ARM.attributesARM_ATTRIBUTES0x00x133180x100x00x0001
    .shstrtabSTRTAB0x00x133280x580x00x0001
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x80000x80000x130040x130046.15070x5R E0x8000.init .text .fini .rodata
    LOAD0x130040x230040x230040x3140x28c83.75160x6RW 0x8000.eh_frame .ctors .dtors .data .bss
    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 14:49:08.355875969 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:08.360871077 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:08.360956907 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:08.361061096 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:08.366415024 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:09.584023952 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:09.584244013 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:09.584706068 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:09.589525938 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:10.108055115 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:10.108176947 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:10.108264923 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:10.112993002 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:10.633217096 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:10.633449078 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:10.634057999 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:10.638809919 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:10.638883114 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:10.643702984 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:12.636405945 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:12.641365051 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:13.257786989 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:13.298882008 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:25.270231009 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:25.276563883 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:25.798841000 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:25.799016953 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:37.811485052 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:37.817708969 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:38.338717937 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:38.338804960 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:50.350923061 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:49:50.356020927 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:50.873272896 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:49:50.873440981 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:02.880772114 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:02.885674000 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:03.412127018 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:03.412502050 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:15.424472094 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:15.429352999 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:15.946902037 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:15.947045088 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:27.958117008 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:27.963027954 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:28.480664015 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:28.480760098 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:40.493252993 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:40.498245001 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:41.020917892 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:41.021245956 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:53.033699036 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:50:53.038554907 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:53.556382895 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:50:53.556665897 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:51:05.568905115 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:51:05.778136969 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:51:05.810659885 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:51:06.330081940 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:51:06.330234051 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:51:06.543389082 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:51:06.543504953 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:51:06.759382010 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:51:06.759485006 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:51:07.193451881 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:51:07.193576097 CEST557083333192.168.2.1495.85.78.19
    Aug 31, 2024 14:51:08.059416056 CEST33335570895.85.78.19192.168.2.14
    Aug 31, 2024 14:51:08.059509039 CEST557083333192.168.2.1495.85.78.19
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 14:49:08.253273010 CEST5307253192.168.2.148.8.8.8
    Aug 31, 2024 14:49:08.354938984 CEST53530728.8.8.8192.168.2.14
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 31, 2024 14:49:08.253273010 CEST192.168.2.148.8.8.80xa7ffStandard query (0)a.cookiedough.lolA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol95.85.78.19A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol92.223.30.117A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol185.255.178.242A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol51.13.59.242A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol35.206.137.131A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol193.32.179.248A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol35.207.181.87A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol35.213.227.193A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol92.223.30.118A (IP address)IN (0x0001)false
    Aug 31, 2024 14:49:08.354938984 CEST8.8.8.8192.168.2.140xa7ffNo error (0)a.cookiedough.lol92.38.135.253A (IP address)IN (0x0001)false

    System Behavior

    Start time (UTC):12:49:07
    Start date (UTC):31/08/2024
    Path:/tmp/botnt.arm.elf
    Arguments:/tmp/botnt.arm.elf
    File size:4956856 bytes
    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

    Start time (UTC):12:49:07
    Start date (UTC):31/08/2024
    Path:/tmp/botnt.arm.elf
    Arguments:-
    File size:4956856 bytes
    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1