Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
firmware.powerpc.elf

Overview

General Information

Sample name:firmware.powerpc.elf
Analysis ID:1502458
MD5:f36fac9eb16b5dc10e67ae92432236b7
SHA1:3c3cf06ec7e9a4d9e0f3c92d3c0a70cecf703e61
SHA256:cf37e1ff64bf497fcfa11b61e9b801f397c6932424096b09b1f288f9f098096f
Tags:elffirmware
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502458
Start date and time:2024-09-01 17:33:42 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:firmware.powerpc.elf
Detection:MAL
Classification:mal64.linELF@0/1@4/0
  • VT rate limit hit for: daisy.ubuntu.com
Command:/tmp/firmware.powerpc.elf
PID:5482
Exit Code:
Exit Code Info:
Killed:True
Standard Output:
Firmware Upgraded
Standard Error:
  • system is lnxubuntu20
  • firmware.powerpc.elf (PID: 5482, Parent: 5406, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/firmware.powerpc.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
firmware.powerpc.elfMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
  • 0x17998:$s1: LCOGQGPTGP
  • 0x17380:$s3: CFOKLKQVPCVMP
  • 0x175bc:$s4: QWRGPTKQMP
  • 0x1752c:$s5: HWCLVGAJ
SourceRuleDescriptionAuthorStrings
5482.1.00007fd8a8001000.00007fd8a801b000.r-x.sdmpMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
  • 0x17998:$s1: LCOGQGPTGP
  • 0x17380:$s3: CFOKLKQVPCVMP
  • 0x175bc:$s4: QWRGPTKQMP
  • 0x1752c:$s5: HWCLVGAJ
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: firmware.powerpc.elfAvira: detected
Source: firmware.powerpc.elfReversingLabs: Detection: 52%
Source: firmware.powerpc.elfVirustotal: Detection: 51%Perma Link
Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443

System Summary

barindex
Source: firmware.powerpc.elf, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
Source: 5482.1.00007fd8a8001000.00007fd8a801b000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
Source: ELF static info symbol of initial sample.symtab present: no
Source: firmware.powerpc.elf, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
Source: 5482.1.00007fd8a8001000.00007fd8a801b000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
Source: classification engineClassification label: mal64.linELF@0/1@4/0
Source: /tmp/firmware.powerpc.elf (PID: 5482)Queries kernel information via 'uname': Jump to behavior
Source: firmware.powerpc.elf, 5482.1.000055ad5a9e5000.000055ad5aa95000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
Source: firmware.powerpc.elf, 5482.1.000055ad5a9e5000.000055ad5aa95000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: firmware.powerpc.elf, 5482.1.00007ffe6779a000.00007ffe677bb000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
Source: firmware.powerpc.elf, 5482.1.00007ffe6779a000.00007ffe677bb000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/firmware.powerpc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/firmware.powerpc.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
firmware.powerpc.elf53%ReversingLabsLinux.Trojan.Mirai
firmware.powerpc.elf52%VirustotalBrowse
firmware.powerpc.elf100%AviraLINUX/Mirai.bonb
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26SecuriteInfo.com.Linux.Siggen.9999.18582.17843.elfGet hashmaliciousMiraiBrowse
      SecuriteInfo.com.Linux.Siggen.9999.9304.22091.elfGet hashmaliciousMiraiBrowse
        bot.sh4.elfGet hashmaliciousGafgyt, Mirai, OkiruBrowse
          SecuriteInfo.com.ELF.Flooder-TB.29079.9826.elfGet hashmaliciousUnknownBrowse
            XDY9SmIKRN.elfGet hashmaliciousUnknownBrowse
              criptonize.i486.elfGet hashmaliciousUnknownBrowse
                arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                  hmips.elfGet hashmaliciousUnknownBrowse
                    bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.comfirmware.arm-linux-gnueabihf.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        firmware.sparc.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        SecuriteInfo.com.Linux.Siggen.9999.5622.5080.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        SecuriteInfo.com.Linux.Siggen.9999.12346.8960.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        SecuriteInfo.com.Linux.Siggen.9999.18582.17843.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        SecuriteInfo.com.Linux.Siggen.9999.127.12108.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        SecuriteInfo.com.Linux.Siggen.9999.9304.22091.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        bot.arm6.elfGet hashmaliciousMirai, OkiruBrowse
                        • 162.213.35.25
                        SecuriteInfo.com.Linux.Siggen.9999.20093.10545.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        SecuriteInfo.com.ELF.Flooder-TB.29079.9826.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CANONICAL-ASGBfirmware.arc.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        SecuriteInfo.com.Linux.Siggen.9999.20705.30523.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        SecuriteInfo.com.Linux.Siggen.9999.18582.17843.elfGet hashmaliciousMiraiBrowse
                        • 185.125.190.26
                        SecuriteInfo.com.Linux.Siggen.9999.9304.22091.elfGet hashmaliciousMiraiBrowse
                        • 185.125.190.26
                        SecuriteInfo.com.Linux.Siggen.9999.27011.25101.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        bot.mpsl.elfGet hashmaliciousGafgyt, Mirai, OkiruBrowse
                        • 91.189.91.42
                        bot.sh4.elfGet hashmaliciousGafgyt, Mirai, OkiruBrowse
                        • 185.125.190.26
                        bot.mips.elfGet hashmaliciousGafgyt, Mirai, OkiruBrowse
                        • 91.189.91.42
                        bot.m68k.elfGet hashmaliciousGafgyt, Mirai, OkiruBrowse
                        • 91.189.91.42
                        SecuriteInfo.com.Linux.Siggen.9999.22319.26890.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        No context
                        No context
                        Process:/tmp/firmware.powerpc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):10
                        Entropy (8bit):2.446439344671016
                        Encrypted:false
                        SSDEEP:3:gi2gn:g7g
                        MD5:7D8BDA7B196684C6F2938F47B0551B5A
                        SHA1:C65D9A11C0685E27A77D788F75C4759AEA880C55
                        SHA-256:DA942425C51386FF9B51504EE3F0FC95BD2F653DF2440025D3F3E778EB1622F6
                        SHA-512:E6518088F6F175D29ACD996F5D1F574DF7CBD9CABEE7200F84E67947648BE9AE040881957CF0B00C229BA7FAD3E736F9D5B6C25849BBA71B8E8592144DC2BE5D
                        Malicious:false
                        Reputation:low
                        Preview:947409014.
                        File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.316237415117945
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:firmware.powerpc.elf
                        File size:107'992 bytes
                        MD5:f36fac9eb16b5dc10e67ae92432236b7
                        SHA1:3c3cf06ec7e9a4d9e0f3c92d3c0a70cecf703e61
                        SHA256:cf37e1ff64bf497fcfa11b61e9b801f397c6932424096b09b1f288f9f098096f
                        SHA512:0d99666f2c33425a3aed8c192b70c9e88a0af93a245f799a74e4873b6695bb72d6cd15111b6a6fb281ccb64fc512e267fd63f507c260063fb5b6c85664d74be7
                        SSDEEP:1536:FtHdIgQ8PK5pJg6TM1LO00Bc6WpsZnkYx4KDxU5fPULaUBaDo3:FZopT0OXBUWkYGKDu5rUP3
                        TLSH:6EB33B01730C0A43E2531EF03A3F1BE593BFE59111E4E685650EDB468272E77668AFD9
                        File Content Preview:.ELF...........................4.........4. ...(..........................................................).........dt.Q.............................!..|......$H...H.o5...$8!. |...N.. .!..|.......?..........T..../...@..\?........+../...A..$8...})......N..

                        ELF header

                        Class:ELF32
                        Data:2's complement, big endian
                        Version:1 (current)
                        Machine:PowerPC
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x100001f0
                        Flags:0x0
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:107512
                        Section Header Size:40
                        Number of Section Headers:12
                        Header String Table Index:11
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x100000940x940x240x00x6AX004
                        .textPROGBITS0x100000b80xb80x16f8c0x00x6AX004
                        .finiPROGBITS0x100170440x170440x200x00x6AX004
                        .rodataPROGBITS0x100170680x170680x29980x00x2A008
                        .ctorsPROGBITS0x1002a0000x1a0000x80x00x3WA004
                        .dtorsPROGBITS0x1002a0080x1a0080x80x00x3WA004
                        .dataPROGBITS0x1002a0180x1a0180x34c0x00x3WA008
                        .sdataPROGBITS0x1002a3640x1a3640x480x00x3WA004
                        .sbssNOBITS0x1002a3ac0x1a3ac0xa80x00x3WA004
                        .bssNOBITS0x1002a4540x1a3ac0x25600x00x3WA004
                        .shstrtabSTRTAB0x00x1a3ac0x4b0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x100000000x100000000x19a000x19a006.40150x5R E0x10000.init .text .fini .rodata
                        LOAD0x1a0000x1002a0000x1002a0000x3ac0x29b43.18910x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 1, 2024 17:34:46.450565100 CEST48202443192.168.2.13185.125.190.26
                        Sep 1, 2024 17:35:16.914489985 CEST48202443192.168.2.13185.125.190.26
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 1, 2024 17:34:34.811049938 CEST4595853192.168.2.138.8.8.8
                        Sep 1, 2024 17:34:39.816664934 CEST4668653192.168.2.138.8.8.8
                        Sep 1, 2024 17:34:44.821743965 CEST3713853192.168.2.138.8.8.8
                        Sep 1, 2024 17:34:49.827054977 CEST4910553192.168.2.138.8.8.8
                        Sep 1, 2024 17:34:54.830280066 CEST4676953192.168.2.138.8.8.8
                        Sep 1, 2024 17:34:59.830986977 CEST3844753192.168.2.138.8.8.8
                        Sep 1, 2024 17:35:04.836100101 CEST5974953192.168.2.138.8.8.8
                        Sep 1, 2024 17:35:09.841412067 CEST4459853192.168.2.138.8.8.8
                        Sep 1, 2024 17:35:14.845191002 CEST4241553192.168.2.138.8.8.8
                        Sep 1, 2024 17:37:21.454113960 CEST4183053192.168.2.138.8.8.8
                        Sep 1, 2024 17:37:21.454113960 CEST4741653192.168.2.138.8.8.8
                        Sep 1, 2024 17:37:21.621038914 CEST53474168.8.8.8192.168.2.13
                        Sep 1, 2024 17:37:26.458478928 CEST5792553192.168.2.131.1.1.1
                        Sep 1, 2024 17:37:26.470540047 CEST53579251.1.1.1192.168.2.13
                        Sep 1, 2024 17:37:26.470808983 CEST5537953192.168.2.131.1.1.1
                        Sep 1, 2024 17:37:26.477591991 CEST53553791.1.1.1192.168.2.13
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Sep 1, 2024 17:37:21.454113960 CEST192.168.2.138.8.8.80xfd7Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Sep 1, 2024 17:37:21.454113960 CEST192.168.2.138.8.8.80x255fStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                        Sep 1, 2024 17:37:26.458478928 CEST192.168.2.131.1.1.10xfd7Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Sep 1, 2024 17:37:26.470808983 CEST192.168.2.131.1.1.10xc230Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Sep 1, 2024 17:37:26.470540047 CEST1.1.1.1192.168.2.130xfd7No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                        Sep 1, 2024 17:37:26.470540047 CEST1.1.1.1192.168.2.130xfd7No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):15:34:33
                        Start date (UTC):01/09/2024
                        Path:/tmp/firmware.powerpc.elf
                        Arguments:/tmp/firmware.powerpc.elf
                        File size:5388968 bytes
                        MD5 hash:ae65271c943d3451b7f026d1fadccea6