Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1527154
MD5:81dd71e9f03de8f7b5d7bd0066e9c205
SHA1:0edf3d61c024022d383bfc979bb975baa97eb8da
SHA256:f10799c82050872254a29aa22acbb636db36d6a2d9c48311bbb4f6c6ac8ccf84
Tags:elfuser-abuse_ch
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Reads system information from the proc file system
Sample contains strings that are user agent strings indicative of HTTP manipulation
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1527154
Start date and time:2024-10-06 21:30:15 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal72.troj.linELF@0/1@0/0
  • Skipping network analysis since amount of network traffic is too extensive
  • VT rate limit hit for: na.elf
Command:/tmp/na.elf
PID:5519
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
eshay
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5519, Parent: 5445, MD5: 81dd71e9f03de8f7b5d7bd0066e9c205) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5521, Parent: 5519)
    • na.elf New Fork (PID: 5522, Parent: 5519)
    • na.elf New Fork (PID: 5561, Parent: 5519)
      • na.elf New Fork (PID: 5562, Parent: 5561)
        • na.elf New Fork (PID: 5575, Parent: 5562)
  • udisksd New Fork (PID: 5533, Parent: 803)
  • dumpe2fs (PID: 5533, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5601, Parent: 803)
  • dumpe2fs (PID: 5601, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5603, Parent: 803)
  • dumpe2fs (PID: 5603, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5604, Parent: 803)
  • dumpe2fs (PID: 5604, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • sh (PID: 5660, Parent: 1498, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/bin/gnome-shell
  • gnome-shell (PID: 5660, Parent: 1498, MD5: da7a257239677622fe4b3a65972c9e87) Arguments: /usr/bin/gnome-shell
  • sh (PID: 5663, Parent: 1498, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
  • gsd-sharing (PID: 5663, Parent: 1498, MD5: e29d9025d98590fbb69f89fdbd4438b3) Arguments: /usr/libexec/gsd-sharing
  • gdm3 New Fork (PID: 5667, Parent: 1333)
  • Default (PID: 5667, Parent: 1333, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 5688, Parent: 1333)
  • Default (PID: 5688, Parent: 1333, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • systemd New Fork (PID: 5694, Parent: 1)
  • systemd-user-runtime-dir (PID: 5694, Parent: 1, MD5: d55f4b0847f88131dbcfb07435178e54) Arguments: /lib/systemd/systemd-user-runtime-dir stop 127
  • cleanup
SourceRuleDescriptionAuthorStrings
na.elfLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xa64d:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
na.elfLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x8e23:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
SourceRuleDescriptionAuthorStrings
5519.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xa64d:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
5519.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x8e23:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
5575.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xa64d:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
5575.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x8e23:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfAvira: detected
Source: na.elfReversingLabs: Detection: 28%
Source: na.elfJoe Sandbox ML: detected

System Summary

barindex
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5519.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5519.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5575.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5575.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/na.elf (PID: 5521)SIGKILL sent: pid: 1553, result: successfulJump to behavior
Source: /tmp/na.elf (PID: 5521)SIGKILL sent: pid: 1659, result: successfulJump to behavior
Source: /tmp/na.elf (PID: 5521)SIGKILL sent: pid: 5660, result: successfulJump to behavior
Source: /tmp/na.elf (PID: 5521)SIGKILL sent: pid: 5663, result: successfulJump to behavior
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5519.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5519.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5575.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5575.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: classification engineClassification label: mal72.troj.linELF@0/1@0/0

Persistence and Installation Behavior

barindex
Source: /tmp/na.elf (PID: 5519)File: /proc/5519/mountsJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5660/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5663/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3241/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3483/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1732/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1333/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1695/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3235/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3234/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5533/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5654/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5655/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1617/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1615/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5670/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5671/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5672/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5673/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5674/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5675/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3255/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3253/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1591/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3252/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3251/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3250/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1623/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3249/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/764/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3368/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1585/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3488/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/766/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/888/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1509/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5667/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5668/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/804/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5669/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1867/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3407/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5680/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5681/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5682/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5683/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5684/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5685/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5686/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1484/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1514/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5717/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5718/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1479/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5719/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3379/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/777/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/931/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1595/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5676/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/658/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/779/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/812/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/933/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5677/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5678/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5679/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3419/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5694/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5695/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5696/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5697/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5730/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3310/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3275/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3274/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3273/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3394/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3272/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5728/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/782/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5729/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3303/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1762/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/3027/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1486/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/789/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5687/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5720/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5721/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5601/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/1806/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5722/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5723/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5603/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5724/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5604/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5521)File opened: /proc/5725/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5575)Reads from proc file: /proc/statJump to behavior
Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36
Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36
Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
Source: Initial sampleUser agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
1
File and Directory Discovery
Remote ServicesData from Local System1
Data Obfuscation
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1527154 Sample: na.elf Startdate: 06/10/2024 Architecture: LINUX Score: 72 27 Malicious sample detected (through community Yara rule) 2->27 29 Antivirus / Scanner detection for submitted sample 2->29 31 Multi AV Scanner detection for submitted file 2->31 33 Machine Learning detection for sample 2->33 8 na.elf 2->8         started        11 gnome-session-binary sh gnome-shell 2->11         started        13 gnome-session-binary sh gsd-sharing 2->13         started        15 7 other processes 2->15 process3 signatures4 35 Sample reads /proc/mounts (often used for finding a writable filesystem) 8->35 17 na.elf 8->17         started        19 na.elf 8->19         started        21 na.elf 8->21         started        process5 process6 23 na.elf 17->23         started        process7 25 na.elf 23->25         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
na.elf29%ReversingLabsLinux.Backdoor.Mirai
na.elf100%AviraEXP/ELF.Mirai.Bot.Hua.d
na.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
No context
No context
No context
No context
No context
Process:/usr/libexec/gsd-sharing
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:93B885ADFE0DA089CDF634904FD59F71
SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
Malicious:false
Reputation:high, very likely benign file
Preview:.
File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Entropy (8bit):6.563015313506456
TrID:
  • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
  • ELF Executable and Linkable format (generic) (4004/1) 49.84%
File name:na.elf
File size:62'816 bytes
MD5:81dd71e9f03de8f7b5d7bd0066e9c205
SHA1:0edf3d61c024022d383bfc979bb975baa97eb8da
SHA256:f10799c82050872254a29aa22acbb636db36d6a2d9c48311bbb4f6c6ac8ccf84
SHA512:eb4c29e66bebe5ebd9f691babc228faf7d904e9a57dd5226f43c3fa70a979622208e66c5a37d3f0595ac184411a4f1da9ebc8fbfcbfd7ca99e6582568b487224
SSDEEP:1536:WOAdzrxaedED0wAcrQZNSCSTsYi7IlUvanvimH8WSzm:WOA9tzdED0wAcUZULs7IWSvhH8q
TLSH:A9537CC19B82D9F5ED4701B1203B63128B73E57A9139FB93CB9A3831EE12701961B79D
File Content Preview:.ELF....................d...4...........4. ...(..........................................................8..........Q.td............................U..S.......7....h....3...[]...$.............U......=.....t..5...................u........t....h.p..........

ELF header

Class:ELF32
Data:2's complement, little endian
Version:1 (current)
Machine:Intel 80386
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x8048164
Flags:0x0
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:3
Section Header Offset:62416
Section Header Size:40
Number of Section Headers:10
Header String Table Index:9
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.initPROGBITS0x80480940x940x1c0x00x6AX001
.textPROGBITS0x80480b00xb00xd4560x00x6AX0016
.finiPROGBITS0x80555060xd5060x170x00x6AX001
.rodataPROGBITS0x80555200xd5200x1b9c0x00x2A0032
.ctorsPROGBITS0x80580c00xf0c00x80x00x3WA004
.dtorsPROGBITS0x80580c80xf0c80x80x00x3WA004
.dataPROGBITS0x80580e00xf0e00x2b00x00x3WA0032
.bssNOBITS0x80583a00xf3900x35200x00x3WA0032
.shstrtabSTRTAB0x00xf3900x3e0x00x0001
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x80480000x80480000xf0bc0xf0bc6.59640x5R E0x1000.init .text .fini .rodata
LOAD0xf0c00x80580c00x80580c00x2d00x38003.63410x6RW 0x1000.ctors .dtors .data .bss
GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

System Behavior

Start time (UTC):19:30:55
Start date (UTC):06/10/2024
Path:/tmp/na.elf
Arguments:/tmp/na.elf
File size:62816 bytes
MD5 hash:81dd71e9f03de8f7b5d7bd0066e9c205

Start time (UTC):19:30:55
Start date (UTC):06/10/2024
Path:/tmp/na.elf
Arguments:-
File size:62816 bytes
MD5 hash:81dd71e9f03de8f7b5d7bd0066e9c205

Start time (UTC):19:30:55
Start date (UTC):06/10/2024
Path:/tmp/na.elf
Arguments:-
File size:62816 bytes
MD5 hash:81dd71e9f03de8f7b5d7bd0066e9c205

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/tmp/na.elf
Arguments:-
File size:62816 bytes
MD5 hash:81dd71e9f03de8f7b5d7bd0066e9c205

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/tmp/na.elf
Arguments:-
File size:62816 bytes
MD5 hash:81dd71e9f03de8f7b5d7bd0066e9c205

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/tmp/na.elf
Arguments:-
File size:62816 bytes
MD5 hash:81dd71e9f03de8f7b5d7bd0066e9c205

Start time (UTC):19:30:55
Start date (UTC):06/10/2024
Path:/usr/lib/udisks2/udisksd
Arguments:-
File size:483056 bytes
MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

Start time (UTC):19:30:55
Start date (UTC):06/10/2024
Path:/usr/sbin/dumpe2fs
Arguments:dumpe2fs -h /dev/dm-0
File size:31112 bytes
MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/usr/lib/udisks2/udisksd
Arguments:-
File size:483056 bytes
MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/usr/sbin/dumpe2fs
Arguments:dumpe2fs -h /dev/dm-0
File size:31112 bytes
MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/usr/lib/udisks2/udisksd
Arguments:-
File size:483056 bytes
MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/usr/sbin/dumpe2fs
Arguments:dumpe2fs -h /dev/dm-0
File size:31112 bytes
MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/usr/lib/udisks2/udisksd
Arguments:-
File size:483056 bytes
MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

Start time (UTC):19:30:56
Start date (UTC):06/10/2024
Path:/usr/sbin/dumpe2fs
Arguments:dumpe2fs -h /dev/dm-0
File size:31112 bytes
MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

Start time (UTC):19:31:25
Start date (UTC):06/10/2024
Path:/usr/libexec/gnome-session-binary
Arguments:-
File size:334664 bytes
MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

Start time (UTC):19:31:25
Start date (UTC):06/10/2024
Path:/bin/sh
Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/bin/gnome-shell
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):19:31:25
Start date (UTC):06/10/2024
Path:/usr/bin/gnome-shell
Arguments:/usr/bin/gnome-shell
File size:23168 bytes
MD5 hash:da7a257239677622fe4b3a65972c9e87

Start time (UTC):19:31:25
Start date (UTC):06/10/2024
Path:/usr/libexec/gnome-session-binary
Arguments:-
File size:334664 bytes
MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

Start time (UTC):19:31:25
Start date (UTC):06/10/2024
Path:/bin/sh
Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):19:31:25
Start date (UTC):06/10/2024
Path:/usr/libexec/gsd-sharing
Arguments:/usr/libexec/gsd-sharing
File size:35424 bytes
MD5 hash:e29d9025d98590fbb69f89fdbd4438b3

Start time (UTC):19:31:26
Start date (UTC):06/10/2024
Path:/usr/sbin/gdm3
Arguments:-
File size:453296 bytes
MD5 hash:2492e2d8d34f9377e3e530a61a15674f

Start time (UTC):19:31:26
Start date (UTC):06/10/2024
Path:/etc/gdm3/PrimeOff/Default
Arguments:/etc/gdm3/PrimeOff/Default
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):19:31:26
Start date (UTC):06/10/2024
Path:/usr/sbin/gdm3
Arguments:-
File size:453296 bytes
MD5 hash:2492e2d8d34f9377e3e530a61a15674f

Start time (UTC):19:31:26
Start date (UTC):06/10/2024
Path:/etc/gdm3/PrimeOff/Default
Arguments:/etc/gdm3/PrimeOff/Default
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):19:31:36
Start date (UTC):06/10/2024
Path:/usr/lib/systemd/systemd
Arguments:-
File size:1620224 bytes
MD5 hash:9b2bec7092a40488108543f9334aab75

Start time (UTC):19:31:36
Start date (UTC):06/10/2024
Path:/lib/systemd/systemd-user-runtime-dir
Arguments:/lib/systemd/systemd-user-runtime-dir stop 127
File size:22672 bytes
MD5 hash:d55f4b0847f88131dbcfb07435178e54