Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1527372
MD5:cb1b3fedf4e16b8f0c24ca82d53d57a6
SHA1:afa6eb368b79b06de4bb47eb203e2769eaf929ea
SHA256:a9548407fd30076f9899d76de7de71d40ef3ae8713875b882fd912b14fd874a2
Tags:elfTheMoonuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
ELF contains segments with high entropy indicating compressed/encrypted content
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1527372
Start date and time:2024-10-06 23:05:34 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 32s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal56.linELF@0/0@0/0
  • VT rate limit hit for: na.elf
Command:/tmp/na.elf
PID:5511
Exit Code:255
Exit Code Info:
Killed:False
Standard Output:

Standard Error:/lib/ld-linux.so.3: No such file or directory
  • system is lnxubuntu20
  • na.elf (PID: 5511, Parent: 5430, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/na.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfAvira: detected
Source: na.elfReversingLabs: Detection: 44%
Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.linELF@0/0@0/0
Source: na.elfSubmission file: segment LOAD with 7.9465 entropy (max. 8.0)
Source: /tmp/na.elf (PID: 5511)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5511.1.000055eef073d000.000055eef086b000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: na.elf, 5511.1.00007fff1ecc5000.00007fff1ece6000.rw-.sdmpBinary or memory string: qemu: %s: %s
Source: na.elf, 5511.1.00007fff1ecc5000.00007fff1ece6000.rw-.sdmpBinary or memory string: leqemu: %s: %s
Source: na.elf, 5511.1.000055eef073d000.000055eef086b000.rw-.sdmpBinary or memory string: Urg.qemu.gdb.arm.sys.regs">
Source: na.elf, 5511.1.000055eef073d000.000055eef086b000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: na.elf, 5511.1.00007fff1ecc5000.00007fff1ece6000.rw-.sdmpBinary or memory string: 3x86_64/usr/bin/qemu-arm/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5511.1.00007fff1ecc5000.00007fff1ece6000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: na.elf, 5511.1.000055eef073d000.000055eef086b000.rw-.sdmpBinary or memory string: rg.qemu.gdb.arm.sys.regs">
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Obfuscated Files or Information
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
na.elf45%ReversingLabsLinux.Trojan.Generic
na.elf100%AviraANDROID/AVE.Agent.apiln
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
185.125.190.26
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
185.125.190.26na.elfGet hashmaliciousUnknownBrowse
    na.elfGet hashmaliciousMoobotBrowse
      na.elfGet hashmaliciousUnknownBrowse
        na.elfGet hashmaliciousMiraiBrowse
          na.elfGet hashmaliciousMiraiBrowse
            na.elfGet hashmaliciousMiraiBrowse
              na.elfGet hashmaliciousUnknownBrowse
                na.elfGet hashmaliciousMirai, MoobotBrowse
                  na.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousUnknownBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CANONICAL-ASGBna.elfGet hashmaliciousUnknownBrowse
                      • 185.125.190.26
                      na.elfGet hashmaliciousMiraiBrowse
                      • 91.189.91.42
                      na.elfGet hashmaliciousUnknownBrowse
                      • 91.189.91.42
                      na.elfGet hashmaliciousUnknownBrowse
                      • 91.189.91.42
                      na.elfGet hashmaliciousUnknownBrowse
                      • 91.189.91.42
                      na.elfGet hashmaliciousUnknownBrowse
                      • 91.189.91.42
                      na.elfGet hashmaliciousMiraiBrowse
                      • 91.189.91.42
                      na.elfGet hashmaliciousMoobotBrowse
                      • 185.125.190.26
                      na.elfGet hashmaliciousMirai, MoobotBrowse
                      • 91.189.91.42
                      na.elfGet hashmaliciousUnknownBrowse
                      • 185.125.190.26
                      No context
                      No context
                      No created / dropped files found
                      File type:ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.3, for GNU/Linux 2.6.16, stripped
                      Entropy (8bit):7.132170357422907
                      TrID:
                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                      File name:na.elf
                      File size:44'599 bytes
                      MD5:cb1b3fedf4e16b8f0c24ca82d53d57a6
                      SHA1:afa6eb368b79b06de4bb47eb203e2769eaf929ea
                      SHA256:a9548407fd30076f9899d76de7de71d40ef3ae8713875b882fd912b14fd874a2
                      SHA512:7e9d9b69440f736afa341dd8cd7a08e2144b35126db4c0916e795c2620b36e5107cef448fb71b1b068c4361052485f23b9e7ab25f50bda223292cf487453ba7f
                      SSDEEP:768:tEk4HYDdlz7gkQ4fPAkI5gtAFlEZXcFn5ZD:ek44xxgkdPAkugCFOIV
                      TLSH:E2137D41E953CA5ACFE51230EE9F8388333227ACE77776257E14819CE75E0045A3BD95
                      File Content Preview:.ELF..............(.........4...........4. ...(........p.c..............................4...4...4.......................4...4...4....................................c...c...............c...c...c..TD..`D...............d...d...d......................H...H..

                      ELF header

                      Class:ELF32
                      Data:2's complement, little endian
                      Version:1 (current)
                      Machine:ARM
                      Version Number:0x1
                      Type:EXEC (Executable file)
                      OS/ABI:UNIX - System V
                      ABI Version:0
                      Entry Point Address:0x8ab0
                      Flags:0x5000202
                      ELF Header Size:52
                      Program Header Offset:52
                      Program Header Size:32
                      Number of Program Headers:8
                      Section Header Offset:43400
                      Section Header Size:40
                      Number of Section Headers:27
                      Header String Table Index:26
                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                      NULL0x00x00x00x00x0000
                      .interpPROGBITS0x81340x1340x130x00x2A001
                      .note.ABI-tagNOTE0x81480x1480x200x00x2A004
                      .hashHASH0x81680x1680xc80x40x2A404
                      .dynsymDYNSYM0x82300x2300x1f00x100x2A514
                      .dynstrSTRTAB0x84200x4200x1190x00x2A001
                      .gnu.versionVERSYM0x853a0x53a0x3e0x20x2A402
                      .gnu.version_rVERNEED0x85780x5780x200x00x2A514
                      .rel.dynREL0x85980x5980x80x80x2A404
                      .rel.pltREL0x85a00x5a00xd80x80x2A4114
                      .initPROGBITS0x86780x6780xc0x00x6AX004
                      .pltPROGBITS0x86840x6840x1580x40x6AX004
                      .textPROGBITS0x87dc0x7dc0x50c80x00x6AX004
                      .finiPROGBITS0xd8a40x58a40x80x00x6AX004
                      .rodataPROGBITS0xd8ac0x58ac0xb400x00x2A004
                      .ARM.exidxARM_EXIDX0xe3ec0x63ec0x80x00x82AL1204
                      .eh_framePROGBITS0xe3f40x63f40x40x00x2A004
                      .init_arrayINIT_ARRAY0x163f80x63f80x40x00x3WA004
                      .fini_arrayFINI_ARRAY0x163fc0x63fc0x40x00x3WA004
                      .jcrPROGBITS0x164000x64000x40x00x3WA004
                      .dynamicDYNAMIC0x164040x64040xf00x80x3WA504
                      .gotPROGBITS0x164f40x64f40x7c0x40x3WA004
                      .dataPROGBITS0x165700x65700x42dc0x00x3WA004
                      .bssNOBITS0x1a84c0xa84c0xc0x00x3WA004
                      .commentPROGBITS0x00xa84c0x1f0x10x30MS001
                      .ARM.attributesARM_ATTRIBUTES0x00xa86b0x390x00x0001
                      .shstrtabSTRTAB0x00xa8a40xe30x00x0001
                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                      EXIDX0x63ec0xe3ec0xe3ec0x80x82.40560x4R 0x4.ARM.exidx
                      PHDR0x340x80340x80340x1000x1002.38490x5R E0x4
                      INTERP0x1340x81340x81340x130x133.68190x4R 0x1/lib/ld-linux.so.3.interp
                      LOAD0x00x80000x80000x63f80x63f86.12280x5R E0x8000.interp .note.ABI-tag .hash .dynsym .dynstr .gnu.version .gnu.version_r .rel.dyn .rel.plt .init .plt .text .fini .rodata .ARM.exidx .eh_frame
                      LOAD0x63f80x163f80x163f80x44540x44607.94650x6RW 0x8000.init_array .fini_array .jcr .dynamic .got .data .bss
                      DYNAMIC0x64040x164040x164040xf00xf02.42740x6RW 0x4.dynamic
                      NOTE0x1480x81480x81480x200x201.68620x4R 0x4.note.ABI-tag
                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
                      TypeMetaValueTag
                      DT_NEEDEDsharedliblibdl.so.20x1
                      DT_NEEDEDsharedliblibc.so.60x1
                      DT_INITvalue0x86780xc
                      DT_FINIvalue0xd8a40xd
                      DT_INIT_ARRAYvalue0x163f80x19
                      DT_INIT_ARRAYSZbytes40x1b
                      DT_FINI_ARRAYvalue0x163fc0x1a
                      DT_FINI_ARRAYSZbytes40x1c
                      DT_HASHvalue0x81680x4
                      DT_STRTABvalue0x84200x5
                      DT_SYMTABvalue0x82300x6
                      DT_STRSZbytes2810xa
                      DT_SYMENTbytes160xb
                      DT_DEBUGvalue0x00x15
                      DT_PLTGOTvalue0x164f40x3
                      DT_PLTRELSZbytes2160x2
                      DT_PLTRELpltrelDT_REL0x14
                      DT_JMPRELvalue0x85a00x17
                      DT_RELvalue0x85980x11
                      DT_RELSZbytes80x12
                      DT_RELENTbytes80x13
                      DT_VERNEEDvalue0x85780x6ffffffe
                      DT_VERNEEDNUMvalue10x6fffffff
                      DT_VERSYMvalue0x853a0x6ffffff0
                      DT_NULLvalue0x00x0
                      NameVersion Info NameVersion Info File NameSection NameValueSizeSymbol TypeSymbol BindSymbol VisibilityNdx
                      .dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                      _ITM_deregisterTMCloneTable.dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                      _ITM_registerTMCloneTable.dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                      _Jv_RegisterClasses.dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                      __gmon_start__.dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                      __libc_start_mainGLIBC_2.4libc.so.6.dynsym0x87280FUNC<unknown>DEFAULTSHN_UNDEF
                      __xstatGLIBC_2.4libc.so.6.dynsym0x87040FUNC<unknown>DEFAULTSHN_UNDEF
                      _exitGLIBC_2.4libc.so.6.dynsym0x86bc0FUNC<unknown>DEFAULTSHN_UNDEF
                      abortGLIBC_2.4libc.so.6.dynsym0x87c40FUNC<unknown>DEFAULTSHN_UNDEF
                      chmodGLIBC_2.4libc.so.6.dynsym0x87b80FUNC<unknown>DEFAULTSHN_UNDEF
                      closeGLIBC_2.4libc.so.6.dynsym0x87d00FUNC<unknown>DEFAULTSHN_UNDEF
                      dup2GLIBC_2.4libc.so.6.dynsym0x86ec0FUNC<unknown>DEFAULTSHN_UNDEF
                      execlGLIBC_2.4libc.so.6.dynsym0x87a00FUNC<unknown>DEFAULTSHN_UNDEF
                      exitGLIBC_2.4libc.so.6.dynsym0x87640FUNC<unknown>DEFAULTSHN_UNDEF
                      fcloseGLIBC_2.4libc.so.6.dynsym0x87880FUNC<unknown>DEFAULTSHN_UNDEF
                      fopenGLIBC_2.4libc.so.6.dynsym0x86a40FUNC<unknown>DEFAULTSHN_UNDEF
                      forkGLIBC_2.4libc.so.6.dynsym0x87940FUNC<unknown>DEFAULTSHN_UNDEF
                      freeGLIBC_2.4libc.so.6.dynsym0x86b00FUNC<unknown>DEFAULTSHN_UNDEF
                      fwriteGLIBC_2.4libc.so.6.dynsym0x87100FUNC<unknown>DEFAULTSHN_UNDEF
                      mallocGLIBC_2.4libc.so.6.dynsym0x871c0FUNC<unknown>DEFAULTSHN_UNDEF
                      memcpyGLIBC_2.4libc.so.6.dynsym0x86c80FUNC<unknown>DEFAULTSHN_UNDEF
                      memsetGLIBC_2.4libc.so.6.dynsym0x877c0FUNC<unknown>DEFAULTSHN_UNDEF
                      openGLIBC_2.4libc.so.6.dynsym0x87580FUNC<unknown>DEFAULTSHN_UNDEF
                      raiseGLIBC_2.4libc.so.6.dynsym0x86980FUNC<unknown>DEFAULTSHN_UNDEF
                      reallocGLIBC_2.4libc.so.6.dynsym0x86f80FUNC<unknown>DEFAULTSHN_UNDEF
                      setsidGLIBC_2.4libc.so.6.dynsym0x87700FUNC<unknown>DEFAULTSHN_UNDEF
                      signalGLIBC_2.4libc.so.6.dynsym0x86d40FUNC<unknown>DEFAULTSHN_UNDEF
                      systemGLIBC_2.4libc.so.6.dynsym0x87340FUNC<unknown>DEFAULTSHN_UNDEF
                      umaskGLIBC_2.4libc.so.6.dynsym0x87ac0FUNC<unknown>DEFAULTSHN_UNDEF
                      unlinkGLIBC_2.4libc.so.6.dynsym0x86e00FUNC<unknown>DEFAULTSHN_UNDEF
                      wait4GLIBC_2.4libc.so.6.dynsym0x87400FUNC<unknown>DEFAULTSHN_UNDEF
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 6, 2024 23:06:37.923737049 CEST46540443192.168.2.14185.125.190.26
                      Oct 6, 2024 23:07:09.154405117 CEST46540443192.168.2.14185.125.190.26

                      System Behavior

                      Start time (UTC):21:06:28
                      Start date (UTC):06/10/2024
                      Path:/tmp/na.elf
                      Arguments:/tmp/na.elf
                      File size:4956856 bytes
                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1