Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1528728
MD5: 19dad4c81a132c2f56cfef4200247153
SHA1: 1bb562dd568d40ce861a7313135cb90970d2ccea
SHA256: 8d2630c56841b247afba8def549b14c745294340bbcd8a5f19b1a76157dfa9df
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: na.elf Avira: detected
Source: na.elf ReversingLabs: Detection: 55%
Source: na.elf Virustotal: Detection: 66% Perma Link
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: //proc/self/exe/bin/busybox/proc/%d/etc/systmp.d/proc//exe%s/lib/systemd/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-server/usr/lib/openssh/sftp-server/sys/system/dvr/main/usr/mnt/mtd/org/userfs/home/process/net_process/var/tmp/sonia/usr/sbin/usr/bin/mnt/gm/bin/var/Sofia/usr/sbin/sshd/usr/sbin/ntpd/usr/sbin/cupsd/usr/lib/apt/methods/http/usr/sbin/crond/usr/sbin/rsyslogd/usr/sbin/inetd/usr/sbin/dnsmasq/usr/bin/DVRServer/usr/bin/DVRShell/usr/bin/DVRControl/usr/bin/DVRRemoteAgent/usr/bin/DVRNetService/root/binw
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal56.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 6223) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.QQuhjvfmRR /tmp/tmp.4ta8QmZA8k /tmp/tmp.bZC4RaebMV Jump to behavior
Source: /usr/bin/dash (PID: 6224) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.QQuhjvfmRR /tmp/tmp.4ta8QmZA8k /tmp/tmp.bZC4RaebMV Jump to behavior
Source: /tmp/na.elf (PID: 6236) Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 6236.1.00007ffe61eba000.00007ffe61edb000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 6236.1.000055fa3754a000.000055fa37678000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: na.elf, 6236.1.00007ffe61eba000.00007ffe61edb000.rw-.sdmp Binary or memory string: qemu: %s: %s
Source: na.elf, 6236.1.00007ffe61eba000.00007ffe61edb000.rw-.sdmp Binary or memory string: leqemu: %s: %s
Source: na.elf, 6236.1.000055fa3754a000.000055fa37678000.rw-.sdmp Binary or memory string: Urg.qemu.gdb.arm.sys.regs">
Source: na.elf, 6236.1.000055fa3754a000.000055fa37678000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: na.elf, 6236.1.00007ffe61eba000.00007ffe61edb000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: na.elf, 6236.1.000055fa3754a000.000055fa37678000.rw-.sdmp Binary or memory string: rg.qemu.gdb.arm.sys.regs">
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs