Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
firmware.armv6l.elf

Overview

General Information

Sample name:firmware.armv6l.elf
Analysis ID:1502465
MD5:a14e13e16b822284d006a755f132a17e
SHA1:42e8a91f093212053401815d522ed36a70cd32f3
SHA256:9e7da9d24946f406d9fddc474724f9889187094680021e620afef81fb18c6f6d
Tags:elffirmware
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502465
Start date and time:2024-09-01 17:43:13 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 39s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:firmware.armv6l.elf
Detection:MAL
Classification:mal64.linELF@0/0@2/0
Command:/tmp/firmware.armv6l.elf
PID:5635
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • firmware.armv6l.elf (PID: 5635, Parent: 5563, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/firmware.armv6l.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
firmware.armv6l.elfMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
  • 0x1a3a4:$s1: LCOGQGPTGP
  • 0x19de8:$s3: CFOKLKQVPCVMP
  • 0x1a024:$s4: QWRGPTKQMP
  • 0x19f94:$s5: HWCLVGAJ
SourceRuleDescriptionAuthorStrings
5635.1.00007fef60017000.00007fef60034000.r-x.sdmpMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
  • 0x1a3a4:$s1: LCOGQGPTGP
  • 0x19de8:$s3: CFOKLKQVPCVMP
  • 0x1a024:$s4: QWRGPTKQMP
  • 0x19f94:$s5: HWCLVGAJ
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: firmware.armv6l.elfAvira: detected
Source: firmware.armv6l.elfReversingLabs: Detection: 52%
Source: firmware.armv6l.elfVirustotal: Detection: 54%Perma Link
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: firmware.armv6l.elf, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
Source: 5635.1.00007fef60017000.00007fef60034000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
Source: ELF static info symbol of initial sample.symtab present: no
Source: firmware.armv6l.elf, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
Source: 5635.1.00007fef60017000.00007fef60034000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
Source: classification engineClassification label: mal64.linELF@0/0@2/0
Source: /tmp/firmware.armv6l.elf (PID: 5635)Queries kernel information via 'uname': Jump to behavior
Source: firmware.armv6l.elf, 5635.1.000055a7b1e17000.000055a7b1f45000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: firmware.armv6l.elf, 5635.1.00007ffc74576000.00007ffc74597000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/firmware.armv6l.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/firmware.armv6l.elf
Source: firmware.armv6l.elf, 5635.1.000055a7b1e17000.000055a7b1f45000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: firmware.armv6l.elf, 5635.1.00007ffc74576000.00007ffc74597000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: firmware.armv6l.elf, 5635.1.00007ffc74576000.00007ffc74597000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
firmware.armv6l.elf53%ReversingLabsLinux.Backdoor.Mirai
firmware.armv6l.elf55%VirustotalBrowse
firmware.armv6l.elf100%AviraLINUX/Mirai.bonb
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalseunknown
No contacted IP infos
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
daisy.ubuntu.comfirmware.i586.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
firmware.mips.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
firmware.mipsel.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
firmware.powerpc.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
firmware.arm-linux-gnueabihf.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
firmware.sparc.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
SecuriteInfo.com.Linux.Siggen.9999.5622.5080.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.25
SecuriteInfo.com.Linux.Siggen.9999.12346.8960.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.25
SecuriteInfo.com.Linux.Siggen.9999.18582.17843.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.25
SecuriteInfo.com.Linux.Siggen.9999.127.12108.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.25
No context
No context
No context
No created / dropped files found
File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
Entropy (8bit):6.18611666156968
TrID:
  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
File name:firmware.armv6l.elf
File size:116'356 bytes
MD5:a14e13e16b822284d006a755f132a17e
SHA1:42e8a91f093212053401815d522ed36a70cd32f3
SHA256:9e7da9d24946f406d9fddc474724f9889187094680021e620afef81fb18c6f6d
SHA512:e59a59c1a88b71223d9b8d39a2dec06dc25db441bc627c5a2b0dff9815da0398f4e2f637978697fbfcee5dff1b202561987f7176d3164d6ac621f33b15bcaefa
SSDEEP:3072:H0Pwprq8efu0AP0EnCGZI+PZeMvaRULDGDFxMR8N8:H7prJ2Aw+PZbvaQCFxxN
TLSH:3AB31846B8818B11C5C612BBFA1E118D331367ACD3DE7213DE189F2477CB96A0E7B952
File Content Preview:.ELF..............(.....T...4...........4. ...(.........................................................H...........Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../.0.............-.@0....S

ELF header

Class:ELF32
Data:2's complement, little endian
Version:1 (current)
Machine:ARM
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x8154
Flags:0x4000002
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:3
Section Header Offset:115876
Section Header Size:40
Number of Section Headers:12
Header String Table Index:11
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.initPROGBITS0x80940x940x100x00x6AX004
.textPROGBITS0x80b00xb00x19a240x00x6AX0016
.finiPROGBITS0x21ad40x19ad40x100x00x6AX004
.rodataPROGBITS0x21ae80x19ae80x262c0x00x2A008
.init_arrayINIT_ARRAY0x2c1180x1c11c0x40x00x3WA004
.fini_arrayFINI_ARRAY0x2c11c0x1c1200x40x00x3WA004
.gotPROGBITS0x2c1240x1c1280x780x40x3WA004
.dataPROGBITS0x2c19c0x1c1a00x2940x00x3WA004
.bssNOBITS0x2c4300x1c4340x29300x00x3WA004
.ARM.attributesARM_ATTRIBUTES0x00x1c4340x100x00x0001
.shstrtabSTRTAB0x00x1c4440x5d0x00x0001
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x80000x80000x1c1140x1c1146.19910x5R E0x8000.init .text .fini .rodata
LOAD0x1c1180x2c1180x2c1140x31c0xac483.98730x6RW 0x8000.init_array .fini_array .got .data .bss
GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
TimestampSource PortDest PortSource IPDest IP
Sep 1, 2024 17:44:18.869158030 CEST4849553192.168.2.151.1.1.1
Sep 1, 2024 17:44:18.869220018 CEST4157153192.168.2.151.1.1.1
Sep 1, 2024 17:44:18.877295017 CEST53484951.1.1.1192.168.2.15
Sep 1, 2024 17:44:18.877351999 CEST53415711.1.1.1192.168.2.15
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Sep 1, 2024 17:44:18.869158030 CEST192.168.2.151.1.1.10x1c7cStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
Sep 1, 2024 17:44:18.869220018 CEST192.168.2.151.1.1.10xc14dStandard query (0)daisy.ubuntu.com28IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Sep 1, 2024 17:44:18.877295017 CEST1.1.1.1192.168.2.150x1c7cNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
Sep 1, 2024 17:44:18.877295017 CEST1.1.1.1192.168.2.150x1c7cNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

System Behavior

Start time (UTC):15:44:17
Start date (UTC):01/09/2024
Path:/tmp/firmware.armv6l.elf
Arguments:/tmp/firmware.armv6l.elf
File size:4956856 bytes
MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1