Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
OIW7aNSHbh.elf

Overview

General Information

Sample name:OIW7aNSHbh.elf
renamed because original name is a hash value
Original sample name:06df7167beb17e0df77f4cba1913fe30.elf
Analysis ID:1532256
MD5:06df7167beb17e0df77f4cba1913fe30
SHA1:19d69c9a177b1901ca3ca4a76d629aea73589ab8
SHA256:586a680a3b116460cdb66c709dc5731d40d0364ad22a243d0631351d4d3dfda7
Tags:32armelfmirai
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532256
Start date and time:2024-10-12 22:56:15 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 10m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:OIW7aNSHbh.elf
renamed because original name is a hash value
Original Sample Name:06df7167beb17e0df77f4cba1913fe30.elf
Detection:MAL
Classification:mal56.linELF@0/0@2/0
Cookbook Comments:
  • Analysis time extended to 480s due to sleep detection in submitted sample
Command:/tmp/OIW7aNSHbh.elf
PID:5529
Exit Code:255
Exit Code Info:
Killed:False
Standard Output:

Standard Error:/lib/ld-uClibc.so.0: No such file or directory
  • system is lnxubuntu20
  • OIW7aNSHbh.elf (PID: 5529, Parent: 5447, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/OIW7aNSHbh.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: OIW7aNSHbh.elfAvira: detected
Source: OIW7aNSHbh.elfVirustotal: Detection: 36%Perma Link
Source: OIW7aNSHbh.elfReversingLabs: Detection: 52%
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.linELF@0/0@2/0
Source: /tmp/OIW7aNSHbh.elf (PID: 5529)Queries kernel information via 'uname': Jump to behavior
Source: OIW7aNSHbh.elf, 5529.1.00007ffca4098000.00007ffca40b9000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/OIW7aNSHbh.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/OIW7aNSHbh.elf
Source: OIW7aNSHbh.elf, 5529.1.0000558084ae7000.0000558084c15000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: OIW7aNSHbh.elf, 5529.1.00007ffca4098000.00007ffca40b9000.rw-.sdmpBinary or memory string: qemu: %s: %s
Source: OIW7aNSHbh.elf, 5529.1.00007ffca4098000.00007ffca40b9000.rw-.sdmpBinary or memory string: leqemu: %s: %s
Source: OIW7aNSHbh.elf, 5529.1.0000558084ae7000.0000558084c15000.rw-.sdmpBinary or memory string: Urg.qemu.gdb.arm.sys.regs">
Source: OIW7aNSHbh.elf, 5529.1.0000558084ae7000.0000558084c15000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: OIW7aNSHbh.elf, 5529.1.00007ffca4098000.00007ffca40b9000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: OIW7aNSHbh.elf, 5529.1.0000558084ae7000.0000558084c15000.rw-.sdmpBinary or memory string: rg.qemu.gdb.arm.sys.regs">
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
OIW7aNSHbh.elf37%VirustotalBrowse
OIW7aNSHbh.elf53%ReversingLabsLinux.Backdoor.Mirai
OIW7aNSHbh.elf100%AviraLINUX/Mirai.bonb
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalseunknown
No contacted IP infos
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
daisy.ubuntu.comEefULigFg1.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.24
Mf9dMcU3qj.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
JnC2t6WhUf.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.24
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.24
na.elfGet hashmaliciousMiraiBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
No context
No context
No context
No created / dropped files found
File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), dynamically linked, interpreter /lib/ld-uClibc.so.0, stripped
Entropy (8bit):6.066039315857265
TrID:
  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
File name:OIW7aNSHbh.elf
File size:30'492 bytes
MD5:06df7167beb17e0df77f4cba1913fe30
SHA1:19d69c9a177b1901ca3ca4a76d629aea73589ab8
SHA256:586a680a3b116460cdb66c709dc5731d40d0364ad22a243d0631351d4d3dfda7
SHA512:d8d525b08fe825397b186763b5f8d2192e2a49afd193be845039c53f3c77ba1bdfc986af8c38a18266fa82967f5415d68a7fa4f89c63895b0d0e35c9ae69dcd7
SSDEEP:768:iII/mKiiXlofzLqRt+9g6jx6SJaoGJNgK4zrxz:iIIeTiXiMa4I+e
TLSH:37D22A86B9C28A16C1C8637AFA5F11CE332267E8D1DB7703DC048F11B6D951F0E6B992
File Content Preview:.ELF..............(.....h...4...$t......4. ...(.........4...4...4....................................................................q...q...............q...q...q...............................q..................Q.td............................/lib/ld-uCl

ELF header

Class:ELF32
Data:2's complement, little endian
Version:1 (current)
Machine:ARM
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x8c68
Flags:0x4000002
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:6
Section Header Offset:29732
Section Header Size:40
Number of Section Headers:19
Header String Table Index:18
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.interpPROGBITS0x80f40xf40x140x00x2A001
.hashHASH0x81080x1080x1900x40x2A304
.dynsymDYNSYM0x82980x2980x3d00x100x2A414
.dynstrSTRTAB0x86680x6680x1d70x00x2A001
.rel.pltREL0x88400x8400x1780x80x2A374
.initPROGBITS0x89b80x9b80x100x00x6AX004
.pltPROGBITS0x89c80x9c80x2480x40x6AX004
.textPROGBITS0x8c100xc100x60180x00x6AX004
.finiPROGBITS0xec280x6c280x100x00x6AX004
.rodataPROGBITS0xec380x6c380x5a00x00x2A004
.init_arrayINIT_ARRAY0x171dc0x71dc0x40x00x3WA004
.fini_arrayFINI_ARRAY0x171e00x71e00x40x00x3WA004
.dynamicDYNAMIC0x171e80x71e80xb80x80x3WA404
.gotPROGBITS0x172a00x72a00xc80x40x3WA004
.dataPROGBITS0x173680x73680x180x00x3WA004
.bssNOBITS0x173800x73800x1fc0x00x3WA004
.ARM.attributesARM_ATTRIBUTES0x00x73800x160x00x0001
.shstrtabSTRTAB0x00x73960x8d0x00x0001
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
PHDR0x340x80340x80340xc00xc02.06370x5R E0x4
INTERP0xf40x80f40x80f40x140x143.68420x4R 0x1/lib/ld-uClibc.so.0.interp
LOAD0x00x80000x80000x71d80x71d86.13250x5R E0x8000.interp .hash .dynsym .dynstr .rel.plt .init .plt .text .fini .rodata
LOAD0x71dc0x171dc0x171dc0x1a40x3a02.39970x6RW 0x8000.init_array .fini_array .dynamic .got .data .bss
DYNAMIC0x00x00x171e80x00x00.00000x6RW 0x4
GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
TypeMetaValueTag
DT_NEEDEDsharedliblibc.so.00x1
DT_INITvalue0x89b80xc
DT_FINIvalue0xec280xd
DT_INIT_ARRAYvalue0x171dc0x19
DT_INIT_ARRAYSZbytes40x1b
DT_FINI_ARRAYvalue0x171e00x1a
DT_FINI_ARRAYSZbytes40x1c
DT_HASHvalue0x81080x4
DT_STRTABvalue0x86680x5
DT_SYMTABvalue0x82980x6
DT_STRSZbytes4710xa
DT_SYMENTbytes160xb
DT_DEBUGvalue0x00x15
DT_PLTGOTvalue0x172a00x3
DT_PLTRELSZbytes3760x2
DT_PLTRELpltrelDT_REL0x14
DT_JMPRELvalue0x88400x17
DT_NULLvalue0x00x0
NameVersion Info NameVersion Info File NameSection NameValueSizeSymbol TypeSymbol BindSymbol VisibilityNdx
.dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
__bss_end__.dynsym0x1757c0NOTYPE<unknown>DEFAULTSHN_ABS
__bss_start.dynsym0x173800NOTYPE<unknown>DEFAULTSHN_ABS
__bss_start__.dynsym0x173800NOTYPE<unknown>DEFAULTSHN_ABS
__data_start.dynsym0x173680NOTYPE<unknown>DEFAULT17
__end__.dynsym0x1757c0NOTYPE<unknown>DEFAULTSHN_ABS
__errno_location.dynsym0x8b8032FUNC<unknown>DEFAULTSHN_UNDEF
__exidx_end.dynsym0xf1d80NOTYPE<unknown>DEFAULTSHN_ABS
__exidx_start.dynsym0xf1d80NOTYPE<unknown>DEFAULTSHN_ABS
__uClibc_main.dynsym0x8b38848FUNC<unknown>DEFAULTSHN_UNDEF
_bss_end__.dynsym0x1757c0NOTYPE<unknown>DEFAULTSHN_ABS
_edata.dynsym0x173800NOTYPE<unknown>DEFAULTSHN_ABS
_end.dynsym0x1757c0NOTYPE<unknown>DEFAULTSHN_ABS
_start.dynsym0x8c6880FUNC<unknown>DEFAULT8
abort.dynsym0x8a84296FUNC<unknown>DEFAULTSHN_UNDEF
atoi.dynsym0x032FUNC<unknown>DEFAULTSHN_UNDEF
bind.dynsym0x8ab468FUNC<unknown>DEFAULTSHN_UNDEF
calloc.dynsym0x8a90320FUNC<unknown>DEFAULTSHN_UNDEF
clock.dynsym0x8ba452FUNC<unknown>DEFAULTSHN_UNDEF
close.dynsym0x8bd4100FUNC<unknown>DEFAULTSHN_UNDEF
closedir.dynsym0x8bbc272FUNC<unknown>DEFAULTSHN_UNDEF
connect.dynsym0x89f4116FUNC<unknown>DEFAULTSHN_UNDEF
exit.dynsym0x8b8c196FUNC<unknown>DEFAULTSHN_UNDEF
fcntl.dynsym0x8bc8244FUNC<unknown>DEFAULTSHN_UNDEF
fork.dynsym0x8b2c972FUNC<unknown>DEFAULTSHN_UNDEF
free.dynsym0x8bec572FUNC<unknown>DEFAULTSHN_UNDEF
getpid.dynsym0x8a0c72FUNC<unknown>DEFAULTSHN_UNDEF
getppid.dynsym0x8b5020FUNC<unknown>DEFAULTSHN_UNDEF
getsockname.dynsym0x8c0468FUNC<unknown>DEFAULTSHN_UNDEF
getsockopt.dynsym0x8b7472FUNC<unknown>DEFAULTSHN_UNDEF
inet_addr.dynsym0x8ac040FUNC<unknown>DEFAULTSHN_UNDEF
ioctl.dynsym0x89dc224FUNC<unknown>DEFAULTSHN_UNDEF
kill.dynsym0x8aa856FUNC<unknown>DEFAULTSHN_UNDEF
listen.dynsym0x8b2064FUNC<unknown>DEFAULTSHN_UNDEF
malloc.dynsym0x8a242360FUNC<unknown>DEFAULTSHN_UNDEF
memcpy.dynsym0x04FUNC<unknown>DEFAULTSHN_UNDEF
memset.dynsym0x8b44156FUNC<unknown>DEFAULTSHN_UNDEF
open.dynsym0x8b98100FUNC<unknown>DEFAULTSHN_UNDEF
opendir.dynsym0x8b68196FUNC<unknown>DEFAULTSHN_UNDEF
raise.dynsym0x8be0240FUNC<unknown>DEFAULTSHN_UNDEF
rand.dynsym0x8ad824FUNC<unknown>DEFAULTSHN_UNDEF
read.dynsym0x8af0100FUNC<unknown>DEFAULTSHN_UNDEF
readdir.dynsym0x8a60232FUNC<unknown>DEFAULTSHN_UNDEF
readlink.dynsym0x8a1864FUNC<unknown>DEFAULTSHN_UNDEF
realloc.dynsym0x8b14960FUNC<unknown>DEFAULTSHN_UNDEF
recv.dynsym0x89e8112FUNC<unknown>DEFAULTSHN_UNDEF
recvfrom.dynsym0x8a3c136FUNC<unknown>DEFAULTSHN_UNDEF
select.dynsym0x8a54132FUNC<unknown>DEFAULTSHN_UNDEF
send.dynsym0x8a78112FUNC<unknown>DEFAULTSHN_UNDEF
sendto.dynsym0x8b08136FUNC<unknown>DEFAULTSHN_UNDEF
setsid.dynsym0x8bb064FUNC<unknown>DEFAULTSHN_UNDEF
setsockopt.dynsym0x8acc72FUNC<unknown>DEFAULTSHN_UNDEF
sigaddset.dynsym0x8a6c80FUNC<unknown>DEFAULTSHN_UNDEF
sigemptyset.dynsym0x8a0020FUNC<unknown>DEFAULTSHN_UNDEF
signal.dynsym0x8ae4196FUNC<unknown>DEFAULTSHN_UNDEF
sigprocmask.dynsym0x8bf8140FUNC<unknown>DEFAULTSHN_UNDEF
sleep.dynsym0x8a30272FUNC<unknown>DEFAULTSHN_UNDEF
socket.dynsym0x8a4868FUNC<unknown>DEFAULTSHN_UNDEF
time.dynsym0x8b5c48FUNC<unknown>DEFAULTSHN_UNDEF
unlink.dynsym0x8afc64FUNC<unknown>DEFAULTSHN_UNDEF
write.dynsym0x8a9c100FUNC<unknown>DEFAULTSHN_UNDEF
TimestampSource PortDest PortSource IPDest IP
Oct 12, 2024 22:59:46.117932081 CEST5460453192.168.2.151.1.1.1
Oct 12, 2024 22:59:46.117932081 CEST5170753192.168.2.151.1.1.1
Oct 12, 2024 22:59:46.124866962 CEST53546041.1.1.1192.168.2.15
Oct 12, 2024 22:59:46.126024008 CEST53517071.1.1.1192.168.2.15
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Oct 12, 2024 22:59:46.117932081 CEST192.168.2.151.1.1.10x661aStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
Oct 12, 2024 22:59:46.117932081 CEST192.168.2.151.1.1.10x662aStandard query (0)daisy.ubuntu.com28IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Oct 12, 2024 22:59:46.124866962 CEST1.1.1.1192.168.2.150x661aNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
Oct 12, 2024 22:59:46.124866962 CEST1.1.1.1192.168.2.150x661aNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

System Behavior

Start time (UTC):20:57:02
Start date (UTC):12/10/2024
Path:/tmp/OIW7aNSHbh.elf
Arguments:/tmp/OIW7aNSHbh.elf
File size:4956856 bytes
MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1