Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
SecuriteInfo.com.ELF.Mirai-CVD.6145.31005.elf

Overview

General Information

Sample name:SecuriteInfo.com.ELF.Mirai-CVD.6145.31005.elf
Analysis ID:1528450
MD5:7706f8aa31917ac8a9e8064926e2ff75
SHA1:cfcdeb0c2f8ad904c920fd44bd69e79d4f340a94
SHA256:498dbf542e27b894866d4089e3017955bbdca48a98475c42424ab597af7d2fcc
Tags:elf
Errors
  • No process behavior to analyse as no analysis process or sample was found

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Sample has stripped symbol table

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528450
Start date and time:2024-10-07 22:49:24 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 17s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:SecuriteInfo.com.ELF.Mirai-CVD.6145.31005.elf
Detection:MAL
Classification:mal48.linELF@0/0@0/0
  • No process behavior to analyse as no analysis process or sample was found
  • VT rate limit hit for: SecuriteInfo.com.ELF.Mirai-CVD.6145.31005.elf
Command:/tmp/SecuriteInfo.com.ELF.Mirai-CVD.6145.31005.elf
PID:5552
Exit Code:255
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.ELF.Mirai-CVD.6145.31005.elfReversingLabs: Detection: 15%
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/0@0/0
No Mitre Att&ck techniques found
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.ELF.Mirai-CVD.6145.31005.elf16%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
No context
No context
No context
No context
No context
No created / dropped files found
File type:ELF 32-bit LSB executable, Synopsys ARCompact ARC700 cores, version 1 (SYSV), statically linked, stripped
Entropy (8bit):6.397906980661035
TrID:
  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
File name:SecuriteInfo.com.ELF.Mirai-CVD.6145.31005.elf
File size:124'088 bytes
MD5:7706f8aa31917ac8a9e8064926e2ff75
SHA1:cfcdeb0c2f8ad904c920fd44bd69e79d4f340a94
SHA256:498dbf542e27b894866d4089e3017955bbdca48a98475c42424ab597af7d2fcc
SHA512:5955a13c5b2441180345ff1d0ace378c9fed80e217c8122bfe5ffa6e93c0bd3b96c8430bfd80d71a5d817efe9298de83aeed08c703cc3ec1c4bcd54407d3a5e2
SSDEEP:1536:ZyT8GTbF0u/nPx51b93mlvJkaOO8DfVegUh0LZBgE/LW:UT/Tp0qPb3mRevXDjUh0LZBgEq
TLSH:6AC3AE87F34B5590C82103F41BC75BEC5EA322115E2BD8F76C1E663B5AB64CF1A0A792
File Content Preview:.ELF..............].........4...`.......4. ...(.....................P...P........ ......................._....... ..................................................................Q.td.......................................................................

ELF header

Class:ELF32
Data:2's complement, little endian
Version:1 (current)
Machine:<unknown>
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x10608
Flags:0x403
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:5
Section Header Offset:123488
Section Header Size:40
Number of Section Headers:15
Header String Table Index:14
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.initPROGBITS0x101140x1140x220x00x6AX001
.textPROGBITS0x101380x1380x143c40x00x6AX004
.finiPROGBITS0x244fc0x144fc0x160x00x6AX001
.rodataPROGBITS0x245140x145140x7d2c0x00x2A004
.eh_framePROGBITS0x2c2400x1c2400x4100x00x2A004
.tbssNOBITS0x2ffe00x1dfe00x80x00x403WAT004
.fini_arrayFINI_ARRAY0x2ffe00x1dfe00x40x40x3WA004
.ctorsPROGBITS0x2ffe40x1dfe40x80x00x3WA004
.dtorsPROGBITS0x2ffec0x1dfec0x80x00x3WA004
.gotPROGBITS0x2fff40x1dff40x80x00x3WA004
.dataPROGBITS0x300080x1e0080x1b40x00x3WA004
.bssNOBITS0x301bc0x1e1bc0x5d280x00x3WA004
.ARC.attributes<unknown>0x00x1e1bc0x320x00x0001
.shstrtabSTRTAB0x00x1e1ee0x6f0x00x0001
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x100000x100000x1c6500x1c6506.64480x5R E0x2000.init .text .fini .rodata .eh_frame
LOAD0x1dfe00x2ffe00x2ffe00x1dc0x5f042.49550x6RW 0x2000.tbss .fini_array .ctors .dtors .got .data .bss
NOTE0x00x00x00x00x00.00000x4R 0x4
TLS0x1dfe00x2ffe00x2ffe00x00x80.00000x4R 0x4.tbss
GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
No network behavior found

System Behavior