Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1527222
MD5: 71481f6ca8315b68ea13f18375671c3f
SHA1: e60a7e8b42555d51b222bc355a8968c5269ac720
SHA256: 413a131005421c004268630e678f02d0311f9128b59f33daf5b3be6b3028324f
Tags: elfuser-abuse_ch

Detection

Score: 60
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample has stripped symbol table

Classification

AV Detection

barindex
Source: na.elf Avira: detected
Source: na.elf ReversingLabs: Detection: 42%
Source: na.elf Joe Sandbox ML: detected
Source: na.elf String found in binary or memory: http://fontello.com
Source: na.elf String found in binary or memory: https://github.com/fatedier/frp)http2:
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal60.linELF@0/0@0/0
Source: ELF file section Submission: na.elf
Source: na.elf Binary or memory string: Subject: AMDisbetter!AuthenticAMDBidi_ControlCIDR addressCONTINUATIONCentaurHaulsContent-TypeCookie.ValueECDSA-SHA256ECDSA-SHA384ECDSA-SHA512FECRecoveredGenuineIntelGenuineTMx86Geode by NSCI'm a teapotI/O possibleInCsumErrorsInstAltMatchJoin_ControlKVMKVMKVMKVMLittleEndianMax-ForwardsMeetei_MayekMicrosoft HvMime-VersionMulti-StatusNot ExtendedNot ModifiedPUSH_PROMISEPahawh_HmongPassiveOpensRCPT TO:<%s>SERIALNUMBERSSL_CERT_DIRSora_SompengSyloti_NagriTransitionalTransmetaCPUUnauthorizedVIA VIA VIA VMwareVMwareX-ImforwardsX-Powered-ByXenVMMXenVMM_arguments \abi mismatchaltmatch -> anynotnl -> bad flushGenbad g statusbad recoveryblock clausec ap trafficc hs trafficcan't happencas64 failedchan receivecheck failedchild exitedclose notifycontent-typecontext.TODOdumping heapecho requestend tracegc
No contacted IP infos