Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1528718
MD5:d67cbbfaa0ff94b44135c640cf1f3209
SHA1:44172da72c648d336d251c2a2c7b6559743994f2
SHA256:c26d997f4c050caf08661d08183b17d3ecaf2d1ecbfe0a029ad0cbf7de79bdde
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Deletes system log files
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528718
Start date and time:2024-10-08 09:47:39 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 47s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal60.troj.evad.linELF@0/0@3/0
Command:/tmp/na.elf
PID:5579
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB lEarNs nOthinG xd
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5579, Parent: 5502, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5581, Parent: 5579)
    • na.elf New Fork (PID: 5583, Parent: 5579)
    • na.elf New Fork (PID: 5585, Parent: 5579)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfReversingLabs: Detection: 39%
Source: na.elfVirustotal: Detection: 39%Perma Link
Source: na.elfString: /proc//exewgetinitcurltftp/fdsocketproc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/

Networking

barindex
Source: global trafficTCP traffic: 156.244.16.207 ports 3,4,6,7,9,49376
Source: global trafficTCP traffic: 192.168.2.14:45630 -> 156.244.16.207:49376
Source: /tmp/na.elf (PID: 5579)Socket: 127.0.0.1:1234Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.16.207
Source: unknownUDP traffic detected without corresponding DNS query: 116.203.104.203
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal60.troj.evad.linELF@0/0@3/0

Data Obfuscation

barindex
Source: /tmp/na.elf (PID: 5583)File: /etc/configJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /root/.cacheJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /root/.sshJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /root/.configJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /root/.localJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /tmp/.X11-unixJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /tmp/.Test-unixJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /tmp/.font-unixJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /tmp/.ICE-unixJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /tmp/.XIM-unixJump to behavior
Source: /tmp/na.elf (PID: 5583)Directory: /etc/.javaJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5583)Log files deleted: /var/log/kern.logJump to behavior
Source: /tmp/na.elf (PID: 5579)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5579.1.0000556c54a77000.0000556c54bc5000.rw-.sdmpBinary or memory string: TlU!/etc/qemu-binfmt/arm
Source: na.elf, 5579.1.00007ffea8ae9000.00007ffea8b0a000.rw-.sdmpBinary or memory string: (2gx86_64/usr/bin/qemu-arm/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5579.1.0000556c54a77000.0000556c54bc5000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: na.elf, 5579.1.00007ffea8ae9000.00007ffea8b0a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Indicator Removal
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
na.elf39%ReversingLabsLinux.Backdoor.Mirai
na.elf39%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
156.244.16.207
unknownSeychelles
132839POWERLINE-AS-APPOWERLINEDATACENTERHKtrue
116.203.104.203
unknownGermany
24940HETZNER-ASDEfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
116.203.104.203na.elfGet hashmaliciousUnknownBrowse
    na.elfGet hashmaliciousUnknownBrowse
      GAP5uekzm4.elfGet hashmaliciousUnknownBrowse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        daisy.ubuntu.comna.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.25
        na.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.25
        na.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.25
        na.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        na.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        na.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        na.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        na.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        na.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        na.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        HETZNER-ASDEreswnop.exeGet hashmaliciousEmotetBrowse
        • 138.201.140.110
        7AeSqNv1rC.exeGet hashmaliciousMicroClip, VidarBrowse
        • 49.12.106.214
        STlUEqhwpx.exeGet hashmaliciousQuasarBrowse
        • 195.201.57.90
        https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.ht.zpdzwq?v=frudxdBjlfmjfqymhfwj.ht.pjd.kwjsy___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzpiNGZlZGFhNjcxOTBhYjU4MTE5MjBlZTRiYTAxZmUwMTo3OmIxYWM6MDg1ODNlNjljZDkwNThkM2ZiM2RjYTI4MzFjZGY4NGFmMTYyZTlhYmVjYWYxY2Q4MmNkZDhiNmFmOWVkOWUxOTpoOlQ6VA#Sm9hbi5LbmlwcGVuQEVsa2F5LkNvbQ==Get hashmaliciousUnknownBrowse
        • 46.4.98.169
        out.exeGet hashmaliciousVidarBrowse
        • 49.12.106.214
        down.exeGet hashmaliciousUnknownBrowse
        • 116.203.9.188
        BzLGqYKy7o.exeGet hashmaliciousSmokeLoaderBrowse
        • 188.40.141.211
        https://cloud.list.lu/index.php/s/znw4dNSttiDzHTBGet hashmaliciousUnknownBrowse
        • 85.10.195.17
        UV2uLdRZix.exeGet hashmaliciousSmokeLoaderBrowse
        • 188.40.141.211
        PURCHASE ORDER-6350.exeGet hashmaliciousFormBookBrowse
        • 148.251.114.233
        POWERLINE-AS-APPOWERLINEDATACENTERHKna.elfGet hashmaliciousGafgytBrowse
        • 103.57.228.99
        na.elfGet hashmaliciousGafgytBrowse
        • 103.57.228.88
        sora.arm.elfGet hashmaliciousMiraiBrowse
        • 154.195.194.109
        na.elfGet hashmaliciousMiraiBrowse
        • 154.213.121.8
        http://www.nesianlife.com/Get hashmaliciousUnknownBrowse
        • 154.89.236.198
        Skype_translate6.3.1.msiGet hashmaliciousUnknownBrowse
        • 45.115.127.166
        novo.spc.elfGet hashmaliciousMirai, MoobotBrowse
        • 156.253.238.101
        x86.elfGet hashmaliciousMiraiBrowse
        • 156.242.206.51
        PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
        • 156.242.132.82
        Product Data Specifications_PDF.exeGet hashmaliciousFormBookBrowse
        • 45.114.171.236
        No context
        No context
        No created / dropped files found
        File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
        Entropy (8bit):5.89778860742822
        TrID:
        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
        File name:na.elf
        File size:50'356 bytes
        MD5:d67cbbfaa0ff94b44135c640cf1f3209
        SHA1:44172da72c648d336d251c2a2c7b6559743994f2
        SHA256:c26d997f4c050caf08661d08183b17d3ecaf2d1ecbfe0a029ad0cbf7de79bdde
        SHA512:2e3355f219cfd825e8dea08d9cd1b00a1a8e6ca157835a509e35b63b2c01b14d4409f7cdba186b8a5a10c173cd15e322053a2ff238585ccc0327e08b7a1e4551
        SSDEEP:768:4aYo507yJdzeV/iSPlkMTp7ESetNT3tbOdmzhLXLXwjp13bhu0++iy8zkrkgn:XqZPV9ESedzhQjTrX+o8zOk
        TLSH:4033F881BD81AA0BCAC5137BFA4F42CD37267398E3DE3203DD256F61679A96F0D66101
        File Content Preview:.ELF...a..........(.........4...$.......4. ...(.........................................................HE..........Q.td..................................-...L."....,..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

        ELF header

        Class:ELF32
        Data:2's complement, little endian
        Version:1 (current)
        Machine:ARM
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:ARM - ABI
        ABI Version:0
        Entry Point Address:0x8190
        Flags:0x2
        ELF Header Size:52
        Program Header Offset:52
        Program Header Size:32
        Number of Program Headers:3
        Section Header Offset:49956
        Section Header Size:40
        Number of Section Headers:10
        Header String Table Index:9
        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
        NULL0x00x00x00x00x0000
        .initPROGBITS0x80940x940x180x00x6AX004
        .textPROGBITS0x80b00xb00xb31c0x00x6AX0016
        .finiPROGBITS0x133cc0xb3cc0x140x00x6AX004
        .rodataPROGBITS0x133e00xb3e00x9f40x00x2A004
        .ctorsPROGBITS0x1c0000xc0000x80x00x3WA004
        .dtorsPROGBITS0x1c0080xc0080x80x00x3WA004
        .dataPROGBITS0x1c0140xc0140x2d00x00x3WA004
        .bssNOBITS0x1c2e40xc2e40x42640x00x3WA004
        .shstrtabSTRTAB0x00xc2e40x3e0x00x0001
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x80000x80000xbdd40xbdd45.96160x5R E0x8000.init .text .fini .rodata
        LOAD0xc0000x1c0000x1c0000x2e40x45483.71690x6RW 0x8000.ctors .dtors .data .bss
        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
        TimestampSource PortDest PortSource IPDest IP
        Oct 8, 2024 09:48:46.387142897 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:48:46.392009020 CEST4937645630156.244.16.207192.168.2.14
        Oct 8, 2024 09:48:46.392107010 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:48:46.392323017 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:48:46.397150993 CEST4937645630156.244.16.207192.168.2.14
        Oct 8, 2024 09:49:01.401588917 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:49:01.411262989 CEST4937645630156.244.16.207192.168.2.14
        Oct 8, 2024 09:49:39.393878937 CEST4937645630156.244.16.207192.168.2.14
        Oct 8, 2024 09:49:39.393968105 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:49:56.250437021 CEST4937645630156.244.16.207192.168.2.14
        Oct 8, 2024 09:49:56.250526905 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:50:41.289520025 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:50:41.294449091 CEST4937645630156.244.16.207192.168.2.14
        Oct 8, 2024 09:51:03.862637997 CEST4937645630156.244.16.207192.168.2.14
        Oct 8, 2024 09:51:03.862843990 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:51:20.272044897 CEST4937645630156.244.16.207192.168.2.14
        Oct 8, 2024 09:51:20.272173882 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:51:27.742449045 CEST4516053192.168.2.148.8.8.8
        Oct 8, 2024 09:51:27.747534990 CEST53451608.8.8.8192.168.2.14
        Oct 8, 2024 09:51:27.747607946 CEST4516053192.168.2.148.8.8.8
        Oct 8, 2024 09:51:27.747607946 CEST4516053192.168.2.148.8.8.8
        Oct 8, 2024 09:51:27.747623920 CEST4516053192.168.2.148.8.8.8
        Oct 8, 2024 09:51:27.775549889 CEST4516053192.168.2.148.8.8.8
        Oct 8, 2024 09:51:27.987543106 CEST53451608.8.8.8192.168.2.14
        Oct 8, 2024 09:51:27.987560987 CEST53451608.8.8.8192.168.2.14
        Oct 8, 2024 09:51:27.987565994 CEST53451608.8.8.8192.168.2.14
        Oct 8, 2024 09:51:28.434973955 CEST53451608.8.8.8192.168.2.14
        Oct 8, 2024 09:51:28.435184956 CEST4516053192.168.2.148.8.8.8
        Oct 8, 2024 09:51:30.435561895 CEST53451608.8.8.8192.168.2.14
        Oct 8, 2024 09:51:30.435684919 CEST4516053192.168.2.148.8.8.8
        Oct 8, 2024 09:51:30.440682888 CEST53451608.8.8.8192.168.2.14
        Oct 8, 2024 09:52:20.330446005 CEST4563049376192.168.2.14156.244.16.207
        Oct 8, 2024 09:52:20.335419893 CEST4937645630156.244.16.207192.168.2.14
        TimestampSource PortDest PortSource IPDest IP
        Oct 8, 2024 09:48:45.822135925 CEST377805353192.168.2.14116.203.104.203
        Oct 8, 2024 09:48:46.385337114 CEST535337780116.203.104.203192.168.2.14
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Oct 8, 2024 09:51:27.747607946 CEST192.168.2.148.8.8.80xb791Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
        Oct 8, 2024 09:51:27.747623920 CEST192.168.2.148.8.8.80x843aStandard query (0)daisy.ubuntu.com28IN (0x0001)false
        Oct 8, 2024 09:51:27.775549889 CEST192.168.2.148.8.8.80x843aStandard query (0)daisy.ubuntu.com28IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Oct 8, 2024 09:51:28.434973955 CEST8.8.8.8192.168.2.140xb791No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
        Oct 8, 2024 09:51:28.434973955 CEST8.8.8.8192.168.2.140xb791No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

        System Behavior

        Start time (UTC):07:48:43
        Start date (UTC):08/10/2024
        Path:/tmp/na.elf
        Arguments:/tmp/na.elf
        File size:4956856 bytes
        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

        Start time (UTC):07:48:44
        Start date (UTC):08/10/2024
        Path:/tmp/na.elf
        Arguments:-
        File size:4956856 bytes
        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

        Start time (UTC):07:48:44
        Start date (UTC):08/10/2024
        Path:/tmp/na.elf
        Arguments:-
        File size:4956856 bytes
        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

        Start time (UTC):07:48:44
        Start date (UTC):08/10/2024
        Path:/tmp/na.elf
        Arguments:-
        File size:4956856 bytes
        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1