Linux Analysis Report
aisuru.ppc.elf

Overview

General Information

Sample name: aisuru.ppc.elf
Analysis ID: 1502203
MD5: ad1ccbb54f6a1953052f947b5bd459e3
SHA1: 8a6930871e2277bd33d51c09eff1de58c236e71e
SHA256: d0d5147855c2367f952a1c25c676b09b09d2563c7dde9a7b74ab9c5c174f4f95
Tags: aisuruelf
Infos:

Detection

Score: 3
Range: 0 - 100
Whitelisted: false

Signatures

Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Source: global traffic TCP traffic: 192.168.2.23:60542 -> 5.8.33.179:2348
Source: /tmp/aisuru.ppc.elf (PID: 6261) Socket: 127.0.0.1:2174 Jump to behavior
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: global traffic DNS traffic detected: DNS query: g.foxnointel.ru
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: clean3.linELF@0/316@1/0
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1582/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1582/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/3088/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/3088/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/230/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/230/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/110/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/231/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/231/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/111/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/232/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/232/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1579/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1579/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/112/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/233/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/233/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1699/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1699/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/113/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/234/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/234/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1335/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1335/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1698/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1698/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/114/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/235/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1334/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1334/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1576/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1576/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/2302/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/2302/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/115/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/236/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/236/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/116/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/237/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/237/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/117/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/118/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/910/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/910/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/119/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/119/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/912/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/912/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/4724/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/4724/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/10/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/10/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/2307/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/2307/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/11/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/11/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/918/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/918/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/6241/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/6241/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/12/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/12/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/13/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/13/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/14/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/14/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/6242/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/6242/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/15/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/15/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/16/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/16/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/17/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/17/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/18/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/18/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1594/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1594/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/120/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/120/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/121/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/121/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1349/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1349/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/1/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/122/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/122/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/243/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/243/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/123/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/123/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/2/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/2/cmdline Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/124/maps Jump to behavior
Source: /tmp/aisuru.ppc.elf (PID: 6279) File opened: /proc/124/cmdline Jump to behavior
Source: /usr/bin/dash (PID: 6248) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.kRWZnofMLV /tmp/tmp.HstYksKKyC /tmp/tmp.IdsNbnnfpd Jump to behavior
Source: /usr/bin/dash (PID: 6249) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.kRWZnofMLV /tmp/tmp.HstYksKKyC /tmp/tmp.IdsNbnnfpd Jump to behavior
Source: submitted sample Stderr: Segmentation fault: exit code = 0
Source: /tmp/aisuru.ppc.elf (PID: 6259) Queries kernel information via 'uname': Jump to behavior
Source: aisuru.ppc.elf, 6259.1.00007ffe9c22f000.00007ffe9c250000.rw-.sdmp Binary or memory string: @#rx86_64/usr/bin/qemu-ppc/tmp/aisuru.ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/aisuru.ppc.elf
Source: aisuru.ppc.elf, 6259.1.00005575cff7e000.00005575d002e000.rw-.sdmp Binary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
Source: aisuru.ppc.elf, 6259.1.00005575cff7e000.00005575d002e000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/ppc
Source: aisuru.ppc.elf, 6259.1.00007ffe9c22f000.00007ffe9c250000.rw-.sdmp Binary or memory string: /usr/bin/qemu-ppc
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs