Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1528792
MD5: 26197afb874c979079b2f8e83b608149
SHA1: 3611c1c6c1871993bd820debea926ca72bd5ec36
SHA256: a5ae954ee99df4650fef49580dfc565973c69abdcc4739b3ad08fd95d5356454
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: na.elf ReversingLabs: Detection: 15%
Source: na.elf String: /proc//exewgetashinitcurltftp/fdsocketproc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/

Networking

barindex
Source: global traffic TCP traffic: 154.90.62.142 ports 2,3,4,8,9,38429
Source: global traffic TCP traffic: 154.223.21.228 ports 1,2,5,6,7,27651,42061
Source: global traffic TCP traffic: 38.60.249.66 ports 7193,2,3,6,7,8,32876
Source: global traffic DNS traffic detected: malformed DNS query: subcarrace.indy. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: eighteen.pirate. [malformed]
Source: global traffic DNS traffic detected: malformed DNS query: krddnsnet.dyn. [malformed]
Source: global traffic TCP traffic: 192.168.2.15:50026 -> 154.223.21.228:27651
Source: global traffic TCP traffic: 192.168.2.15:37776 -> 38.60.249.66:32876
Source: global traffic TCP traffic: 192.168.2.15:38526 -> 154.90.62.142:38429
Source: /tmp/na.elf (PID: 5539) Socket: 127.0.0.1:1234 Jump to behavior
Source: unknown UDP traffic detected without corresponding DNS query: 54.36.111.116
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknown UDP traffic detected without corresponding DNS query: 161.97.219.84
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknown UDP traffic detected without corresponding DNS query: 161.97.219.84
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknown UDP traffic detected without corresponding DNS query: 161.97.219.84
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknown UDP traffic detected without corresponding DNS query: 63.231.92.27
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknown UDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknown UDP traffic detected without corresponding DNS query: 116.203.104.203
Source: global traffic DNS traffic detected: DNS query: kr3ddnsnet1.indy
Source: global traffic DNS traffic detected: DNS query: subcarrace.indy. [malformed]
Source: global traffic DNS traffic detected: DNS query: subcarrace.indy
Source: global traffic DNS traffic detected: DNS query: eighteen.pirate. [malformed]
Source: global traffic DNS traffic detected: DNS query: krddnsnet.dyn. [malformed]
Source: global traffic DNS traffic detected: DNS query: nineteen.libre
Source: global traffic DNS traffic detected: DNS query: fortyfivehundred.dyn
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal56.troj.linELF@0/0@11/0
Source: /tmp/na.elf (PID: 5539) File opened: /proc/11/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/22/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/55/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/66/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/88/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/99/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/111/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/222/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/333/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) File opened: /proc/777/maps Jump to behavior
Source: /tmp/na.elf (PID: 5539) Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5539.1.00007fff15102000.00007fff15123000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5539.1.000055db2a36b000.000055db2a4b9000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: na.elf, 5539.1.000055db2a36b000.000055db2a4b9000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: na.elf, 5539.1.00007fff15102000.00007fff15123000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs