Linux Analysis Report
zsJOEeaatR.elf

Overview

General Information

Sample name: zsJOEeaatR.elf
Analysis ID: 1525201
MD5: be9fe36778e58463bc954ba367114fa8
SHA1: 2c1e603b873043eeebb1d9be09c0eac40472b2d7
SHA256: 1d86c4ef0847cdd08c5d9a23acec43bef9d35cc877d6f5a5844fbdb04b2b948e
Tags: elfupxuser-Felipe
Infos:

Detection

Score: 1
Range: 0 - 100
Whitelisted: false

Signatures

ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: LOAD without section mappings Program segment: 0x400000
Source: classification engine Classification label: clean1.linELF@0/0@0/0
Source: zsJOEeaatR.elf Submission file: segment LOAD with 7.627 entropy (max. 8.0)
Source: zsJOEeaatR.elf Submission file: segment LOAD with 7.9488 entropy (max. 8.0)
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs