Linux Analysis Report
SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf

Overview

General Information

Sample name: SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf
Analysis ID: 1528449
MD5: e1732cc9438171b1190145dc330bd5e1
SHA1: 251bb280cfc8d2758fe1ac880c4d9daf2d8fb1f4
SHA256: da61c1e03512402c4eb51b3cab1d04b4b71a4174c04139ef277e86829d42dda3
Tags: elf
Infos:

Detection

Score: 68
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Opens /sys/class/net/* files useful for querying network interface information
Performs DNS TXT record lookups
Sample deletes itself
Sample scans a subnet
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf ReversingLabs: Detection: 18%

Networking

barindex
Source: global traffic TCP traffic: 5.230.228.47 ports 6036,0,1,2,5,27015,7
Source: global traffic TCP traffic: 5.230.228.42 ports 19153,0,1,2,5,27015,7,10554
Source: global traffic TCP traffic: 5.230.228.45 ports 0,2,5,3389,7,27050
Source: global traffic TCP traffic: 94.131.118.154 ports 19153,1,3,5,27015,9,1935
Source: global traffic TCP traffic: 5.230.229.83 ports 0,2,5,7,2222,27050
Source: global traffic TCP traffic: 194.156.98.15 ports 5000,22022,0,5,3478,1935
Source: global traffic TCP traffic: 5.230.118.247 ports 0,1,443,4,5,3389,10001,10554
Source: /tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf (PID: 5522) Opens: /sys/class/net/ Jump to behavior
Source: /tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf (PID: 5522) Opens: /sys/class/net/ens160/address Jump to behavior
Source: /tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf (PID: 5522) Opens: /sys/class/net/ens160/flags Jump to behavior
Source: /tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf (PID: 5522) Opens: /sys/class/net/ens160/carrier Jump to behavior
Source: ip traffic Subnet 5.230.228.0/24: 5.230.228.47, 5.230.228.42, 5.230.228.45, 5.230.228.44, 5.230.228.62
Source: global traffic TCP traffic: 192.168.2.14:40866 -> 5.230.122.80:10001
Source: global traffic TCP traffic: 192.168.2.14:39920 -> 5.230.229.84:9001
Source: global traffic TCP traffic: 192.168.2.14:41704 -> 5.230.228.44:37777
Source: global traffic TCP traffic: 192.168.2.14:48268 -> 5.230.122.82:3389
Source: global traffic TCP traffic: 192.168.2.14:43814 -> 5.230.229.83:27050
Source: global traffic TCP traffic: 192.168.2.14:53122 -> 5.230.171.8:2222
Source: global traffic TCP traffic: 192.168.2.14:59074 -> 5.230.228.42:27015
Source: global traffic TCP traffic: 192.168.2.14:45694 -> 194.156.98.15:5000
Source: global traffic TCP traffic: 192.168.2.14:41372 -> 5.230.228.45:27050
Source: global traffic TCP traffic: 192.168.2.14:36600 -> 5.230.122.81:37777
Source: global traffic TCP traffic: 192.168.2.14:43614 -> 5.230.118.247:10554
Source: global traffic TCP traffic: 192.168.2.14:59764 -> 5.230.228.47:27015
Source: global traffic TCP traffic: 192.168.2.14:45228 -> 5.230.228.62:10554
Source: global traffic TCP traffic: 192.168.2.14:59436 -> 94.131.118.154:27015
Source: global traffic TCP traffic: 192.168.2.14:45060 -> 185.248.144.209:995
Source: unknown TCP traffic detected without corresponding DNS query: 94.131.118.154
Source: unknown TCP traffic detected without corresponding DNS query: 94.131.118.154
Source: unknown TCP traffic detected without corresponding DNS query: 94.131.118.154
Source: unknown TCP traffic detected without corresponding DNS query: 94.131.118.154
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.80
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.80
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.80
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.80
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.229.84
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.229.84
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.229.84
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.229.84
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.44
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.44
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.44
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.44
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.229.83
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.229.83
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.229.83
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.229.83
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.171.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.171.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.171.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.171.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.42
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.42
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.42
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.42
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.42
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.42
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.42
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.42
Source: unknown TCP traffic detected without corresponding DNS query: 194.156.98.15
Source: unknown TCP traffic detected without corresponding DNS query: 194.156.98.15
Source: unknown TCP traffic detected without corresponding DNS query: 194.156.98.15
Source: unknown TCP traffic detected without corresponding DNS query: 194.156.98.15
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.45
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.45
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.45
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.228.45
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.81
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.81
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.81
Source: unknown TCP traffic detected without corresponding DNS query: 5.230.122.81
Source: unknown TCP traffic detected without corresponding DNS query: 194.156.98.15
Source: unknown TCP traffic detected without corresponding DNS query: 194.156.98.15
Source: global traffic DNS traffic detected: DNS query: iranistrash.libre
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 50566
Source: unknown Network traffic detected: HTTP traffic on port 50566 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42530 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 42530
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal68.spre.troj.spyw.evad.linELF@0/0@1/0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf (PID: 5512) File: /tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf Jump to behavior
Source: /tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf (PID: 5512) Queries kernel information via 'uname': Jump to behavior
Source: /tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf (PID: 5522) Queries kernel information via 'uname': Jump to behavior
Source: SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf, 5512.1.0000563fc4802000.0000563fc4886000.rw-.sdmp Binary or memory string: ?V5!/etc/qemu-binfmt/sh4
Source: SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf, 5512.1.00007fffa5702000.00007fffa5723000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sh4
Source: SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf, 5512.1.00007fffa5702000.00007fffa5723000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sh4/tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf
Source: SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elf, 5512.1.0000563fc4802000.0000563fc4886000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sh4

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Traffic DNS traffic detected: queries for: iranistrash.libre
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs