Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1528915
MD5:2ba8a85df5d3b24700fc438197e1f47c
SHA1:c5c196a4886342f63b81d683d8edf32f12fc3ac7
SHA256:55f624875d6c2f35913ece345e1894b55c9060b8ed112ca70e7c9e2aa46f75a7
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Opens /sys/class/net/* files useful for querying network interface information
Performs DNS TXT record lookups
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system version information
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528915
Start date and time:2024-10-08 13:02:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 18s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal52.spyw.evad.linELF@0/0@1/0
Command:/tmp/na.elf
PID:5698
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Firmware update in progress
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5698, Parent: 5506, MD5: 7dc1c0e23cd5e102bb12e5c29403410e) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5703, Parent: 5698)
      • na.elf New Fork (PID: 5706, Parent: 5703)
  • systemd New Fork (PID: 5740, Parent: 1)
  • snap-failure (PID: 5740, Parent: 1, MD5: 69136a7d575731ce62349f2e4d3e5c36) Arguments: /usr/lib/snapd/snap-failure snapd
    • systemctl (PID: 5753, Parent: 5740, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop snapd.socket
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Networking

barindex
Source: /tmp/na.elf (PID: 5703)Opens: /sys/class/net/Jump to behavior
Source: /tmp/na.elf (PID: 5703)Opens: /sys/class/net/lo/addressJump to behavior
Source: /tmp/na.elf (PID: 5703)Opens: /sys/class/net/ens160/addressJump to behavior
Source: /tmp/na.elf (PID: 5703)Opens: /sys/class/net/ens160/flagsJump to behavior
Source: /tmp/na.elf (PID: 5703)Opens: /sys/class/net/ens160/carrierJump to behavior
Source: global trafficTCP traffic: 192.168.2.13:47052 -> 5.230.228.46:554
Source: global trafficTCP traffic: 192.168.2.13:60912 -> 5.230.122.82:3724
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.228.46
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.228.46
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.228.46
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.228.46
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.228.46
Source: unknownTCP traffic detected without corresponding DNS query: 5.230.122.82
Source: unknownUDP traffic detected without corresponding DNS query: 172.217.192.127
Source: unknownUDP traffic detected without corresponding DNS query: 37.252.191.197
Source: global trafficDNS traffic detected: DNS query: iranistrash.libre
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.spyw.evad.linELF@0/0@1/0
Source: /usr/lib/snapd/snap-failure (PID: 5753)Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socketJump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5740)Reads version info: /proc/versionJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5698)File: /tmp/na.elfJump to behavior
Source: /tmp/na.elf (PID: 5698)Queries kernel information via 'uname': Jump to behavior
Source: /tmp/na.elf (PID: 5703)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5698.1.00005592e25d5000.00005592e263a000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
Source: na.elf, 5698.1.00005592e25d5000.00005592e263a000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/sparc
Source: na.elf, 5698.1.00007ffc62ad4000.00007ffc62af5000.rw-.sdmpBinary or memory string: $x86_64/usr/bin/qemu-sparc/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5698.1.00007ffc62ad4000.00007ffc62af5000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc

HIPS / PFW / Operating System Protection Evasion

barindex
Source: TrafficDNS traffic detected: queries for: iranistrash.libre
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Systemd Service
1
Systemd Service
1
File Deletion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528915 Sample: na.elf Startdate: 08/10/2024 Architecture: LINUX Score: 52 22 iranistrash.libre 2->22 24 172.217.192.127, 3478, 49041 GOOGLEUS United States 2->24 26 2 other IPs or domains 2->26 8 na.elf 2->8         started        11 systemd snap-failure 2->11         started        signatures3 28 Performs DNS TXT record lookups 22->28 process4 signatures5 30 Sample deletes itself 8->30 13 na.elf 8->13         started        16 snap-failure systemctl 11->16         started        18 snap-failure 11->18         started        process6 signatures7 32 Opens /sys/class/net/* files useful for querying network interface information 13->32 20 na.elf 13->20         started        process8
SourceDetectionScannerLabelLink
na.elf3%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
iranistrash.libre
unknown
unknowntrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    5.230.122.82
    unknownGermany
    12586ASGHOSTNETDEfalse
    172.217.192.127
    unknownUnited States
    15169GOOGLEUSfalse
    5.230.228.46
    unknownGermany
    12586ASGHOSTNETDEfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    5.230.122.82na.elfGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.ELF.Mirai-CVD.30330.5069.elfGet hashmaliciousUnknownBrowse
        SecuriteInfo.com.ELF.Mirai-CVD.31968.3467.elfGet hashmaliciousUnknownBrowse
          SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elfGet hashmaliciousUnknownBrowse
            SecuriteInfo.com.ELF.Mirai-CVD.17384.13664.elfGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.ELF.Mirai-CVD.12952.14309.elfGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.ELF.Mirai-CVD.5487.13505.elfGet hashmaliciousUnknownBrowse
                  5.230.228.46SecuriteInfo.com.ELF.Mirai-CVD.31968.3467.elfGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.ELF.Mirai-CVD.12952.14309.elfGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.ELF.Mirai-CVD.5487.13505.elfGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.ELF.Mirai-COW.6055.9040.elfGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.ELF.Mirai-COW.15022.10577.elfGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.ELF.Mirai-CVD.15130.25224.elfGet hashmaliciousUnknownBrowse
                              dMCIAXJOD1.elfGet hashmaliciousUnknownBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                ASGHOSTNETDEna.elfGet hashmaliciousUnknownBrowse
                                • 5.230.171.8
                                na.elfGet hashmaliciousUnknownBrowse
                                • 5.230.122.82
                                na.elfGet hashmaliciousUnknownBrowse
                                • 5.230.122.80
                                SecuriteInfo.com.ELF.Mirai-CVD.30330.5069.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.31968.3467.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.17384.13664.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.12952.14309.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.5487.13505.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-COW.6055.9040.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                ASGHOSTNETDEna.elfGet hashmaliciousUnknownBrowse
                                • 5.230.229.84
                                na.elfGet hashmaliciousUnknownBrowse
                                • 5.230.171.8
                                na.elfGet hashmaliciousUnknownBrowse
                                • 5.230.122.82
                                na.elfGet hashmaliciousUnknownBrowse
                                • 5.230.122.80
                                SecuriteInfo.com.ELF.Mirai-CVD.30330.5069.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.31968.3467.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.11330.22523.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.17384.13664.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.12952.14309.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                SecuriteInfo.com.ELF.Mirai-CVD.5487.13505.elfGet hashmaliciousUnknownBrowse
                                • 5.230.118.247
                                No context
                                No context
                                No created / dropped files found
                                File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                                Entropy (8bit):6.050535699140847
                                TrID:
                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                File name:na.elf
                                File size:83'180 bytes
                                MD5:2ba8a85df5d3b24700fc438197e1f47c
                                SHA1:c5c196a4886342f63b81d683d8edf32f12fc3ac7
                                SHA256:55f624875d6c2f35913ece345e1894b55c9060b8ed112ca70e7c9e2aa46f75a7
                                SHA512:ec1ff94b71f00d3178fa00aeb7ff445c9058a87ac68884aaba3042a7906216fdedb5b754b871d259c0cddb2d2351b0ccbd8cfc6a248eaa23119a2274f8e9159a
                                SSDEEP:1536:txGnjzXTp2NIRoPUHCdeJTYmxU3kkqMA1ztBl/+WmtOwDrOOt:txyDdM0Cde629Btm1DrOOt
                                TLSH:43836C21AAB61E27C1D0B57921F74326F2F50B4919A8CA1F7E610E8EFF6556032077BC
                                File Content Preview:.ELF...........................4..C......4. ...(......................?...?...............@...@...@.......*X........dt.Q................................@..(....@.M.................#.....b...`.....!..... ...@.....".........`......$ ... ...@...........`....

                                ELF header

                                Class:ELF32
                                Data:2's complement, big endian
                                Version:1 (current)
                                Machine:Sparc
                                Version Number:0x1
                                Type:EXEC (Executable file)
                                OS/ABI:UNIX - System V
                                ABI Version:0
                                Entry Point Address:0x101a4
                                Flags:0x0
                                ELF Header Size:52
                                Program Header Offset:52
                                Program Header Size:32
                                Number of Program Headers:3
                                Section Header Offset:82700
                                Section Header Size:40
                                Number of Section Headers:12
                                Header String Table Index:11
                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                NULL0x00x00x00x00x0000
                                .initPROGBITS0x100940x940x1c0x00x6AX004
                                .textPROGBITS0x100b00xb00x137180x00x6AX004
                                .finiPROGBITS0x237c80x137c80x140x00x6AX004
                                .rodataPROGBITS0x237e00x137e00x7d80x00x2A008
                                .eh_framePROGBITS0x340000x140000x40x00x3WA004
                                .ctorsPROGBITS0x340040x140040x80x00x3WA004
                                .dtorsPROGBITS0x3400c0x1400c0x80x00x3WA004
                                .gotPROGBITS0x340180x140180xd40x40x3WA004
                                .dataPROGBITS0x340f00x140f00x1cc0x00x3WA008
                                .bssNOBITS0x342c00x142bc0x27980x00x3WA008
                                .shstrtabSTRTAB0x00x142bc0x4d0x00x0001
                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                LOAD0x00x100000x100000x13fb80x13fb86.07450x5R E0x10000.init .text .fini .rodata
                                LOAD0x140000x340000x340000x2bc0x2a583.05930x6RW 0x10000.eh_frame .ctors .dtors .got .data .bss
                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 8, 2024 13:03:55.408366919 CEST47052554192.168.2.135.230.228.46
                                Oct 8, 2024 13:03:55.413480997 CEST554470525.230.228.46192.168.2.13
                                Oct 8, 2024 13:03:55.413558006 CEST47052554192.168.2.135.230.228.46
                                Oct 8, 2024 13:03:55.414005041 CEST47052554192.168.2.135.230.228.46
                                Oct 8, 2024 13:03:55.419698954 CEST554470525.230.228.46192.168.2.13
                                Oct 8, 2024 13:04:05.424562931 CEST47052554192.168.2.135.230.228.46
                                Oct 8, 2024 13:04:05.475162983 CEST554470525.230.228.46192.168.2.13
                                Oct 8, 2024 13:04:06.427366018 CEST609123724192.168.2.135.230.122.82
                                Oct 8, 2024 13:04:07.456284046 CEST609123724192.168.2.135.230.122.82
                                Oct 8, 2024 13:04:07.861440897 CEST3724609125.230.122.82192.168.2.13
                                Oct 8, 2024 13:04:07.861644983 CEST609123724192.168.2.135.230.122.82
                                Oct 8, 2024 13:04:07.861917973 CEST609123724192.168.2.135.230.122.82
                                Oct 8, 2024 13:04:07.862049103 CEST3724609125.230.122.82192.168.2.13
                                Oct 8, 2024 13:04:07.862190008 CEST609123724192.168.2.135.230.122.82
                                Oct 8, 2024 13:04:07.867278099 CEST3724609125.230.122.82192.168.2.13
                                Oct 8, 2024 13:04:08.515744925 CEST3724609125.230.122.82192.168.2.13
                                Oct 8, 2024 13:04:08.515820026 CEST609123724192.168.2.135.230.122.82
                                Oct 8, 2024 13:04:16.789127111 CEST554470525.230.228.46192.168.2.13
                                Oct 8, 2024 13:04:16.789287090 CEST47052554192.168.2.135.230.228.46
                                Oct 8, 2024 13:05:48.609359026 CEST609123724192.168.2.135.230.122.82
                                Oct 8, 2024 13:05:48.614435911 CEST3724609125.230.122.82192.168.2.13
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 8, 2024 13:03:54.736846924 CEST490413478192.168.2.13172.217.192.127
                                Oct 8, 2024 13:03:55.378196955 CEST347849041172.217.192.127192.168.2.13
                                Oct 8, 2024 13:03:55.385791063 CEST5230053192.168.2.1337.252.191.197
                                Oct 8, 2024 13:03:55.406343937 CEST535230037.252.191.197192.168.2.13
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Oct 8, 2024 13:03:55.385791063 CEST192.168.2.1337.252.191.1970x3b65Standard query (0)iranistrash.libre16IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Oct 8, 2024 13:03:55.406343937 CEST37.252.191.197192.168.2.130x3b65No error (0)iranistrash.libreTXT (Text strings)IN (0x0001)false

                                System Behavior

                                Start time (UTC):11:03:50
                                Start date (UTC):08/10/2024
                                Path:/tmp/na.elf
                                Arguments:/tmp/na.elf
                                File size:4379400 bytes
                                MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                Start time (UTC):11:03:53
                                Start date (UTC):08/10/2024
                                Path:/tmp/na.elf
                                Arguments:-
                                File size:4379400 bytes
                                MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                Start time (UTC):11:03:54
                                Start date (UTC):08/10/2024
                                Path:/tmp/na.elf
                                Arguments:-
                                File size:4379400 bytes
                                MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                Start time (UTC):11:04:30
                                Start date (UTC):08/10/2024
                                Path:/usr/lib/systemd/systemd
                                Arguments:-
                                File size:1620224 bytes
                                MD5 hash:9b2bec7092a40488108543f9334aab75

                                Start time (UTC):11:04:30
                                Start date (UTC):08/10/2024
                                Path:/usr/lib/snapd/snap-failure
                                Arguments:/usr/lib/snapd/snap-failure snapd
                                File size:4764904 bytes
                                MD5 hash:69136a7d575731ce62349f2e4d3e5c36

                                Start time (UTC):11:04:30
                                Start date (UTC):08/10/2024
                                Path:/usr/lib/snapd/snap-failure
                                Arguments:-
                                File size:4764904 bytes
                                MD5 hash:69136a7d575731ce62349f2e4d3e5c36

                                Start time (UTC):11:04:30
                                Start date (UTC):08/10/2024
                                Path:/usr/bin/systemctl
                                Arguments:systemctl stop snapd.socket
                                File size:996584 bytes
                                MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                Start time (UTC):11:04:30
                                Start date (UTC):08/10/2024
                                Path:/usr/lib/snapd/snap-failure
                                Arguments:-
                                File size:4764904 bytes
                                MD5 hash:69136a7d575731ce62349f2e4d3e5c36