Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1528789
MD5: 11c85865d23eaa177bf542834dd881c6
SHA1: 781d12d9c15b1290198de53d5f2b91567ca88cec
SHA256: 0183f3e4897805961bad3ade6ed9d34b1b9a441916a5311f2cbaf6eb12527cb1
Tags: elfMiraiuser-abuse_ch
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Reads system version information
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: na.elf ReversingLabs: Detection: 36%
Source: na.elf Virustotal: Detection: 14% Perma Link
Source: na.elf String: /proc//exewgetashinitcurltftp/fdsocketproc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/

Networking

barindex
Source: global traffic TCP traffic: 154.205.144.234 ports 61543,54123,2,3,4,8,9,38429
Source: global traffic TCP traffic: 154.90.62.142 ports 2,3,6,7,8,32876
Source: global traffic TCP traffic: 154.223.21.228 ports 61543,3,4,6,7,9,42061,49376,38429,15987
Source: global traffic TCP traffic: 38.60.249.66 ports 46852,23789,2,4,5,6,8,49376
Source: global traffic DNS traffic detected: malformed DNS query: kr3ddnsnet1.indy. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: 75cents.libre. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: 2joints.libre. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: kr2ddnsnet.dyn. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: krddnsnet.dyn. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: fortyfivehundred.dyn. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: nineteen.libre. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: imaverygoodbadboy.libre. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: r3racegame.indy. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: 21savage.dyn. [malformed]
Source: global traffic TCP traffic: 192.168.2.13:37004 -> 154.223.21.228:49376
Source: global traffic TCP traffic: 192.168.2.13:57840 -> 154.205.144.234:38429
Source: global traffic TCP traffic: 192.168.2.13:37786 -> 38.60.249.66:46852
Source: global traffic TCP traffic: 192.168.2.13:47116 -> 154.90.62.142:32876
Source: /tmp/na.elf (PID: 5730) Socket: 127.0.0.1:1234 Jump to behavior
Source: unknown UDP traffic detected without corresponding DNS query: 185.84.81.194
Source: unknown UDP traffic detected without corresponding DNS query: 54.36.111.116
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 63.231.92.27
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 185.84.81.194
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 161.97.219.84
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 185.84.81.194
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 54.36.111.116
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 192.3.165.37
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknown UDP traffic detected without corresponding DNS query: 161.97.219.84
Source: unknown UDP traffic detected without corresponding DNS query: 63.231.92.27
Source: unknown UDP traffic detected without corresponding DNS query: 54.36.111.116
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 54.36.111.116
Source: unknown UDP traffic detected without corresponding DNS query: 192.3.165.37
Source: unknown UDP traffic detected without corresponding DNS query: 161.97.219.84
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 192.3.165.37
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 192.3.165.37
Source: unknown UDP traffic detected without corresponding DNS query: 63.231.92.27
Source: unknown UDP traffic detected without corresponding DNS query: 192.3.165.37
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 185.84.81.194
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 185.84.81.194
Source: unknown UDP traffic detected without corresponding DNS query: 192.3.165.37
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 63.231.92.27
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 54.36.111.116
Source: global traffic DNS traffic detected: DNS query: subcarrace.indy
Source: global traffic DNS traffic detected: DNS query: kr3ddnsnet1.indy. [malformed]
Source: global traffic DNS traffic detected: DNS query: 75cents.libre. [malformed]
Source: global traffic DNS traffic detected: DNS query: fortyfivehundred.dyn
Source: global traffic DNS traffic detected: DNS query: imaverygoodbadboy.libre
Source: global traffic DNS traffic detected: DNS query: 2joints.libre. [malformed]
Source: global traffic DNS traffic detected: DNS query: kr2ddnsnet.dyn. [malformed]
Source: global traffic DNS traffic detected: DNS query: r3racegame.indy
Source: global traffic DNS traffic detected: DNS query: krddnsnet.dyn. [malformed]
Source: global traffic DNS traffic detected: DNS query: eighteen.pirate
Source: global traffic DNS traffic detected: DNS query: fortyfivehundred.dyn. [malformed]
Source: global traffic DNS traffic detected: DNS query: nineteen.libre. [malformed]
Source: global traffic DNS traffic detected: DNS query: kr3ddnsnet1.indy
Source: global traffic DNS traffic detected: DNS query: kr2ddnsnet.dyn
Source: global traffic DNS traffic detected: DNS query: imaverygoodbadboy.libre. [malformed]
Source: global traffic DNS traffic detected: DNS query: r3racegame.indy. [malformed]
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: global traffic DNS traffic detected: DNS query: 21savage.dyn. [malformed]
Source: global traffic DNS traffic detected: DNS query: nineteen.libre
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal56.troj.linELF@0/0@47/0
Source: /tmp/na.elf (PID: 5730) File opened: /proc/11/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/22/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/55/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/66/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/88/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/99/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/111/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/222/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/333/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/777/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/888/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/11111/maps Jump to behavior
Source: /tmp/na.elf (PID: 5730) File opened: /proc/999/maps Jump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5787) Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socket Jump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5774) Reads version info: /proc/version Jump to behavior
Source: /tmp/na.elf (PID: 5730) Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5730.1.00007ffc4ce16000.00007ffc4ce37000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5730.1.000055c9923b1000.000055c992500000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: na.elf, 5730.1.000055c9923b1000.000055c992500000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: na.elf, 5730.1.00007ffc4ce16000.00007ffc4ce37000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs