Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1530541
MD5:d155adcf6e6e692f242351fb6b71e7fb
SHA1:f0b5333c7c76d2837c5389e9854c3432f11ae589
SHA256:d4a6b428adbbee7ef528dd595fe44bd448e07c67bf201aaa771f5343104c3621
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1530541
Start date and time:2024-10-10 09:43:22 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 2s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal52.troj.linELF@0/0@3/0
Command:/tmp/na.elf
PID:5425
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB lEarNs nOthinG xd
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5425, Parent: 5347, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5427, Parent: 5425)
    • na.elf New Fork (PID: 5429, Parent: 5425)
    • na.elf New Fork (PID: 5431, Parent: 5425)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfReversingLabs: Detection: 23%
Source: na.elfVirustotal: Detection: 20%Perma Link
Source: na.elfString: ash|login|wget|curl|tftp|ntpdate
Source: na.elfString: /proc//exe|ash|login|wget|curl|tftp|ntpdate/fdsocket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/

Networking

barindex
Source: global trafficTCP traffic: 154.90.62.142 ports 1,2,5,6,7,27651
Source: global trafficTCP traffic: 192.168.2.13:35380 -> 154.90.62.142:27651
Source: /tmp/na.elf (PID: 5425)Socket: 127.0.0.1:1234Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknownUDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: krddnsnet.dyn
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/0@3/0
Source: /tmp/na.elf (PID: 5425)File opened: /proc/11/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/22/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/55/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/66/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/88/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/99/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/111/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/222/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/333/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/777/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/888/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/11111/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)File opened: /proc/999/mapsJump to behavior
Source: /tmp/na.elf (PID: 5425)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5425.1.00007ffe211c4000.00007ffe211e5000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5425.1.000055a0f2510000.000055a0f265f000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: na.elf, 5425.1.000055a0f2510000.000055a0f265f000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: na.elf, 5425.1.00007ffe211c4000.00007ffe211e5000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1530541 Sample: na.elf Startdate: 10/10/2024 Architecture: LINUX Score: 52 15 krddnsnet.dyn 154.90.62.142, 27651, 35380 CNSERVERSUS Seychelles 2->15 17 162.243.19.47, 5353 DIGITALOCEAN-ASNUS United States 2->17 19 daisy.ubuntu.com 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Connects to many ports of the same IP (likely port scanning) 2->23 7 na.elf 2->7         started        signatures3 process4 process5 9 na.elf 7->9         started        11 na.elf 7->11         started        13 na.elf 7->13         started       
SourceDetectionScannerLabelLink
na.elf24%ReversingLabsLinux.Backdoor.Mirai
na.elf20%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
krddnsnet.dyn0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalseunknown
krddnsnet.dyn
154.90.62.142
truetrueunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
162.243.19.47
unknownUnited States
14061DIGITALOCEAN-ASNUSfalse
154.90.62.142
krddnsnet.dynSeychelles
40065CNSERVERSUStrue
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
162.243.19.47ssk7Ah3h5D.elfGet hashmaliciousUnknownBrowse
    na.elfGet hashmaliciousUnknownBrowse
      na.elfGet hashmaliciousUnknownBrowse
        SecuriteInfo.com.Linux.Mirai.5074.20408.25222.elfGet hashmaliciousUnknownBrowse
          SecuriteInfo.com.Linux.Mirai.5074.27008.26400.elfGet hashmaliciousUnknownBrowse
            10cF92lE99.elfGet hashmaliciousUnknownBrowse
              O8s0ONHbkg.elfGet hashmaliciousUnknownBrowse
                la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                  154.90.62.142na.elfGet hashmaliciousUnknownBrowse
                    NLHiAJgSnj.elfGet hashmaliciousUnknownBrowse
                      na.elfGet hashmaliciousUnknownBrowse
                        na.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousUnknownBrowse
                              na.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousUnknownBrowse
                                  na.elfGet hashmaliciousUnknownBrowse
                                    na.elfGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      daisy.ubuntu.comna.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.24
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.24
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.24
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.24
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.25
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.25
                                      krddnsnet.dynna.elfGet hashmaliciousUnknownBrowse
                                      • 154.90.62.142
                                      NLHiAJgSnj.elfGet hashmaliciousUnknownBrowse
                                      • 154.90.62.142
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 154.90.62.142
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CNSERVERSUSna.elfGet hashmaliciousUnknownBrowse
                                      • 154.90.62.142
                                      9b7dlGj5Gq.exeGet hashmaliciousFormBookBrowse
                                      • 198.16.50.171
                                      lPX6PixV4t.exeGet hashmaliciousFormBookBrowse
                                      • 23.224.37.78
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 23.224.58.152
                                      NLHiAJgSnj.elfGet hashmaliciousUnknownBrowse
                                      • 154.90.62.142
                                      fJD7ivEnzm.exeGet hashmaliciousFormBookBrowse
                                      • 43.242.202.169
                                      Z6s208B9QX.exeGet hashmaliciousFormBookBrowse
                                      • 23.224.37.76
                                      5FRWRDOqk7.exeGet hashmaliciousFormBookBrowse
                                      • 43.242.202.169
                                      jpdy1E8K4A.exeGet hashmaliciousFormBookBrowse
                                      • 43.242.202.169
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 154.90.62.142
                                      DIGITALOCEAN-ASNUSna.elfGet hashmaliciousMiraiBrowse
                                      • 167.174.106.205
                                      Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
                                      • 192.241.156.136
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 134.209.166.100
                                      https://event.stibee.com/v2/click/NDA4MDIvMjQzOTA2MS80OTAyMzcv/aHR0cHM6Ly9uLm5ld3MubmF2ZXIuY29tL21uZXdzL2FydGljbGUvMDI1LzAwMDMzOTE2NDc_c2lkPTEwMQGet hashmaliciousUnknownBrowse
                                      • 134.122.57.34
                                      https://meinfokont.blogspot.com/danimbWRVaGhNb3NYNW1EUnN4RnFyVnNGN1dRZkJsdXlNU0VocXhlZ08zOCticlBmWUZaNURLa3ZsQ3ZRMmg2eGE5UlBjUmozbnlGYUNhUWRWdEdjZVJQOGl5dktSUDA4M2hzV3V2TU1LNWpaaWs9Get hashmaliciousPhisherBrowse
                                      • 142.93.185.253
                                      https://www.fsist.com.brGet hashmaliciousUnknownBrowse
                                      • 134.122.57.34
                                      zoHnNvuTkk.dllGet hashmaliciousBumbleBeeBrowse
                                      • 188.166.15.250
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 134.209.166.128
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 134.209.166.125
                                      https://evtokxibasvuruhizmetleriniz.jumpingcrab.com/Get hashmaliciousUnknownBrowse
                                      • 138.68.91.23
                                      No context
                                      No context
                                      No created / dropped files found
                                      File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                                      Entropy (8bit):5.925125707574814
                                      TrID:
                                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                      File name:na.elf
                                      File size:62'924 bytes
                                      MD5:d155adcf6e6e692f242351fb6b71e7fb
                                      SHA1:f0b5333c7c76d2837c5389e9854c3432f11ae589
                                      SHA256:d4a6b428adbbee7ef528dd595fe44bd448e07c67bf201aaa771f5343104c3621
                                      SHA512:d8a6e657e2d8177193818eae54c18d1d710876b85caadcd3f54585db150549b13482b1bc283499aa2767615479202ab91a2661bff5cb0d5e5aabcc2e5abbdee2
                                      SSDEEP:1536:nEng1PtXEtN8zHZJ3ELUdcQ4E12N5nDoEigvFUm1R:3FtXEtwJRd1xEvFUm1R
                                      TLSH:4853FA56F9829A19C5D4077EFE0F118E3313376CE3DE72139D206F206B8A56B0A7B812
                                      File Content Preview:.ELF..............(.....T...4...........4. ...(..........................................................h..........Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../...............-.@0....S

                                      ELF header

                                      Class:ELF32
                                      Data:2's complement, little endian
                                      Version:1 (current)
                                      Machine:ARM
                                      Version Number:0x1
                                      Type:EXEC (Executable file)
                                      OS/ABI:UNIX - System V
                                      ABI Version:0
                                      Entry Point Address:0x8154
                                      Flags:0x4000002
                                      ELF Header Size:52
                                      Program Header Offset:52
                                      Program Header Size:32
                                      Number of Program Headers:3
                                      Section Header Offset:62444
                                      Section Header Size:40
                                      Number of Section Headers:12
                                      Header String Table Index:11
                                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                      NULL0x00x00x00x00x0000
                                      .initPROGBITS0x80940x940x100x00x6AX004
                                      .textPROGBITS0x80b00xb00xe1640x00x6AX0016
                                      .finiPROGBITS0x162140xe2140x100x00x6AX004
                                      .rodataPROGBITS0x162240xe2240xaa40x00x2A004
                                      .eh_framePROGBITS0x1f0000xf0000x40x00x3WA004
                                      .init_arrayINIT_ARRAY0x1f0040xf0040x40x00x3WA004
                                      .fini_arrayFINI_ARRAY0x1f0080xf0080x40x00x3WA004
                                      .gotPROGBITS0x1f0100xf0100x740x40x3WA004
                                      .dataPROGBITS0x1f0840xf0840x3100x00x3WA004
                                      .bssNOBITS0x1f3940xf3940x653c0x00x3WA004
                                      .shstrtabSTRTAB0x00xf3940x570x00x0001
                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                      LOAD0x00x80000x80000xecc80xecc85.99100x5R E0x8000.init .text .fini .rodata
                                      LOAD0xf0000x1f0000x1f0000x3940x68d04.15950x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                                      GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 10, 2024 09:44:12.374264956 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:44:12.379201889 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:44:12.379278898 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:44:12.379481077 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:44:12.384238958 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:44:27.392556906 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:44:27.397397041 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:44:45.011596918 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:44:45.011709929 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:45:30.185919046 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:45:30.186049938 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:46:00.213224888 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:46:00.218085051 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:46:17.850584030 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:46:17.850661039 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:46:17.850672960 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:46:17.850709915 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:46:17.851025105 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:46:17.851073027 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:47:03.207113981 CEST2765135380154.90.62.142192.168.2.13
                                      Oct 10, 2024 09:47:03.207288027 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:47:33.229378939 CEST3538027651192.168.2.13154.90.62.142
                                      Oct 10, 2024 09:47:33.234214067 CEST2765135380154.90.62.142192.168.2.13
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 10, 2024 09:44:07.357533932 CEST529495353192.168.2.13162.243.19.47
                                      Oct 10, 2024 09:44:12.364573002 CEST5116053192.168.2.13130.61.69.123
                                      Oct 10, 2024 09:44:12.371954918 CEST5351160130.61.69.123192.168.2.13
                                      Oct 10, 2024 09:46:48.622345924 CEST5193553192.168.2.131.1.1.1
                                      Oct 10, 2024 09:46:48.622397900 CEST3858653192.168.2.131.1.1.1
                                      Oct 10, 2024 09:46:48.629688978 CEST53519351.1.1.1192.168.2.13
                                      Oct 10, 2024 09:46:48.629714012 CEST53385861.1.1.1192.168.2.13
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 10, 2024 09:44:12.364573002 CEST192.168.2.13130.61.69.1230x3d66Standard query (0)krddnsnet.dynA (IP address)IN (0x0001)false
                                      Oct 10, 2024 09:46:48.622345924 CEST192.168.2.131.1.1.10x4093Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                      Oct 10, 2024 09:46:48.622397900 CEST192.168.2.131.1.1.10x2bcStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 10, 2024 09:44:12.371954918 CEST130.61.69.123192.168.2.130x3d66No error (0)krddnsnet.dyn154.90.62.142A (IP address)IN (0x0001)false
                                      Oct 10, 2024 09:46:48.629688978 CEST1.1.1.1192.168.2.130x4093No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                      Oct 10, 2024 09:46:48.629688978 CEST1.1.1.1192.168.2.130x4093No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                      System Behavior

                                      Start time (UTC):07:44:04
                                      Start date (UTC):10/10/2024
                                      Path:/tmp/na.elf
                                      Arguments:/tmp/na.elf
                                      File size:4956856 bytes
                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                      Start time (UTC):07:44:06
                                      Start date (UTC):10/10/2024
                                      Path:/tmp/na.elf
                                      Arguments:-
                                      File size:4956856 bytes
                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                      Start time (UTC):07:44:06
                                      Start date (UTC):10/10/2024
                                      Path:/tmp/na.elf
                                      Arguments:-
                                      File size:4956856 bytes
                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                      Start time (UTC):07:44:06
                                      Start date (UTC):10/10/2024
                                      Path:/tmp/na.elf
                                      Arguments:-
                                      File size:4956856 bytes
                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1