Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1532416
MD5: 0e1a9b149d5caf5862047f3eed31f360
SHA1: 41648f148716074522ad62cfe0ad4b4d8dc5bc1d
SHA256: 5bdf48dcec43f0b6c0739b8cf6a78441380c3273386a74fd78da5fa5b9bc612c
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 1
Range: 0 - 100
Whitelisted: false

Signatures

ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: LOAD without section mappings Program segment: 0x400000
Source: classification engine Classification label: clean1.linELF@0/0@0/0
Source: na.elf Submission file: segment LOAD with 7.8928 entropy (max. 8.0)
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs