Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1532421
MD5:0db5d6760b8306f85fb5ba89a794002e
SHA1:c04eaab09aa7888f39c4330442c6f53a923d591e
SHA256:7cd48d762a343b483d0ce857e5d2e30fc795d11a20f1827679b9a05d5ab75c3f
Tags:elfuser-abuse_ch
Infos:

Detection

Xmrig
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Executes the "crontab" command typically for achieving persistence
Executes the "iptables" command to insert, remove and/or manipulate rules
Found strings related to Crypto-Mining
Sample is packed with UPX
Sample tries to persist itself using cron
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Reads CPU information from /proc indicative of miner or evasive malware
Reads CPU information from /sys indicative of miner or evasive malware
Reads system information from the proc file system
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532421
Start date and time:2024-10-13 07:07:44 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 47s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal76.troj.evad.mine.linELF@0/3@0/0
  • Skipping network analysis since amount of network traffic is too extensive
Command:/tmp/na.elf
PID:5809
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5809, Parent: 5734, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5811, Parent: 5809)
      • na.elf New Fork (PID: 5813, Parent: 5811)
      • sh (PID: 5813, Parent: 5811, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v crontab >/dev/null 2>&1"
      • na.elf New Fork (PID: 5815, Parent: 5811)
      • sh (PID: 5815, Parent: 5811, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
        • sh New Fork (PID: 5817, Parent: 5815)
        • crontab (PID: 5817, Parent: 5815, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -r
        • sh New Fork (PID: 5818, Parent: 5815)
        • sh New Fork (PID: 5819, Parent: 5815)
        • crontab (PID: 5819, Parent: 5815, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
      • na.elf New Fork (PID: 5820, Parent: 5811)
      • sh (PID: 5820, Parent: 5811, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v php >/dev/null 2>&1"
      • na.elf New Fork (PID: 5822, Parent: 5811)
      • sh (PID: 5822, Parent: 5811, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v nginx >/dev/null 2>&1"
      • na.elf New Fork (PID: 5824, Parent: 5811)
      • sh (PID: 5824, Parent: 5811, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "which apache2"
        • sh New Fork (PID: 5826, Parent: 5824)
        • which (PID: 5826, Parent: 5824, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: which apache2
      • na.elf New Fork (PID: 5827, Parent: 5811)
      • sh (PID: 5827, Parent: 5811, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "which httpd"
        • sh New Fork (PID: 5833, Parent: 5827)
        • which (PID: 5833, Parent: 5827, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: which httpd
      • na.elf New Fork (PID: 5834, Parent: 5811)
      • na.elf New Fork (PID: 5838, Parent: 5811)
      • sh (PID: 5838, Parent: 5811, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -I INPUT -p tcp --dport 35793 -j ACCEPT >/dev/null 2>&1"
        • sh New Fork (PID: 5840, Parent: 5838)
        • iptables (PID: 5840, Parent: 5838, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -I INPUT -p tcp --dport 35793 -j ACCEPT
  • cleanup
SourceRuleDescriptionAuthorStrings
5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    Process Memory Space: na.elf PID: 5809JoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: na.elfReversingLabs: Detection: 28%
      Source: na.elfVirustotal: Detection: 13%Perma Link

      Bitcoin Miner

      barindex
      Source: Yara matchFile source: 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: na.elf PID: 5809, type: MEMORYSTR
      Source: na.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpString found in binary or memory: stratum+ssl://randomx.xmrig.com:443
      Source: na.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpString found in binary or memory: cryptonight/0
      Source: na.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpString found in binary or memory: stratum+tcp://
      Source: /tmp/na.elf (PID: 5809)Reads CPU info from proc file: /proc/cpuinfoJump to behavior
      Source: /tmp/na.elf (PID: 5811)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior

      Networking

      barindex
      Source: /bin/sh (PID: 5840)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 35793 -j ACCEPTJump to behavior
      Source: /bin/sh (PID: 5840)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 35793 -j ACCEPTJump to behavior
      Source: /tmp/na.elf (PID: 5811)Reads hosts file: /etc/hostsJump to behavior
      Source: /tmp/na.elf (PID: 5811)Socket: 0.0.0.0:35793Jump to behavior
      Source: na.elfString found in binary or memory: http://upx.sf.net
      Source: na.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpString found in binary or memory: https://gcc.gnu.org/bugs/):
      Source: na.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpString found in binary or memory: https://xmrig.com/wizard
      Source: na.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpString found in binary or memory: https://xmrig.com/wizard%s
      Source: LOAD without section mappingsProgram segment: 0x0
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: /tmp/na.elf (PID: 5811)SIGKILL sent: pid: 5794, result: successfulJump to behavior
      Source: /tmp/na.elf (PID: 5811)SIGKILL sent: pid: 5843, result: successfulJump to behavior
      Source: classification engineClassification label: mal76.troj.evad.mine.linELF@0/3@0/0

      Data Obfuscation

      barindex
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Id: UPX 4.23 Copyright (C) 1996-2024 the UPX Team. All Rights Reserved. $

      Persistence and Installation Behavior

      barindex
      Source: /bin/sh (PID: 5817)Crontab executable: /usr/bin/crontab -> crontab -rJump to behavior
      Source: /bin/sh (PID: 5819)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
      Source: /bin/sh (PID: 5840)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 35793 -j ACCEPTJump to behavior
      Source: /usr/bin/crontab (PID: 5819)File: /var/spool/cron/crontabs/tmp.JjIApeJump to behavior
      Source: /usr/bin/crontab (PID: 5819)File: /var/spool/cron/crontabs/rootJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/3873/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5811)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5813)Shell command executed: sh -c "command -v crontab >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 5815)Shell command executed: sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"Jump to behavior
      Source: /tmp/na.elf (PID: 5820)Shell command executed: sh -c "command -v php >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 5822)Shell command executed: sh -c "command -v nginx >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 5824)Shell command executed: sh -c "which apache2"Jump to behavior
      Source: /tmp/na.elf (PID: 5827)Shell command executed: sh -c "which httpd"Jump to behavior
      Source: /tmp/na.elf (PID: 5838)Shell command executed: sh -c "iptables -I INPUT -p tcp --dport 35793 -j ACCEPT >/dev/null 2>&1"Jump to behavior
      Source: /bin/sh (PID: 5840)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 35793 -j ACCEPTJump to behavior
      Source: /tmp/na.elf (PID: 5809)Reads from proc file: /proc/cpuinfoJump to behavior
      Source: /tmp/na.elf (PID: 5811)Reads from proc file: /proc/meminfoJump to behavior
      Source: na.elfSubmission file: segment LOAD with 7.8989 entropy (max. 8.0)
      Source: na.elfSubmission file: segment LOAD with 7.9998 entropy (max. 8.0)
      Source: /tmp/na.elf (PID: 5809)Reads CPU info from proc file: /proc/cpuinfoJump to behavior
      Source: /tmp/na.elf (PID: 5811)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
      Source: /tmp/na.elf (PID: 5809)Queries kernel information via 'uname': Jump to behavior
      Source: /tmp/na.elf (PID: 5811)Queries kernel information via 'uname': Jump to behavior
      Source: na.elf, 5809.1.00007ffceec0c000.00007ffceec2d000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
      Source: na.elf, 5809.1.000055f479104000.000055f47929a000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
      Source: na.elf, 5809.1.000055f479104000.000055f47929a000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
      Source: na.elf, 5809.1.00007ffceec0c000.00007ffceec2d000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      11
      Obfuscated Files or Information
      1
      OS Credential Dumping
      11
      Security Software Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Scripting
      Boot or Logon Initialization ScriptsRootkitLSASS Memory1
      File and Directory Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
      System Network Configuration Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532421 Sample: na.elf Startdate: 13/10/2024 Architecture: LINUX Score: 76 37 Multi AV Scanner detection for submitted file 2->37 39 Yara detected Xmrig cryptocurrency miner 2->39 41 Sample is packed with UPX 2->41 8 na.elf 2->8         started        process3 signatures4 49 Found strings related to Crypto-Mining 8->49 11 na.elf 8->11         started        process5 process6 13 na.elf sh 11->13         started        15 na.elf sh 11->15         started        17 na.elf sh 11->17         started        19 5 other processes 11->19 process7 21 sh crontab 13->21         started        25 sh crontab 13->25         started        27 sh 13->27         started        29 sh iptables 15->29         started        31 sh which 17->31         started        33 sh which 19->33         started        file8 35 /var/spool/cron/crontabs/tmp.JjIApe, ASCII 21->35 dropped 43 Sample tries to persist itself using cron 21->43 45 Executes the "crontab" command typically for achieving persistence 21->45 47 Executes the "iptables" command to insert, remove and/or manipulate rules 29->47 signatures9
      SourceDetectionScannerLabelLink
      na.elf29%ReversingLabsLinux.Trojan.Generic
      na.elf14%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://gcc.gnu.org/bugs/):0%URL Reputationsafe
      http://upx.sf.net0%URL Reputationsafe
      https://xmrig.com/wizard2%VirustotalBrowse
      https://xmrig.com/wizard%s2%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://gcc.gnu.org/bugs/):na.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpfalse
      • URL Reputation: safe
      unknown
      http://upx.sf.netna.elftrue
      • URL Reputation: safe
      unknown
      https://xmrig.com/wizardna.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpfalseunknown
      https://xmrig.com/wizard%sna.elf, 5809.1.00007f3b2bb76000.00007f3b2bead000.r-x.sdmpfalseunknown
      No contacted IP infos
      No context
      No context
      No context
      No context
      No context
      Process:/tmp/na.elf
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:W:W
      MD5:ECCBC87E4B5CE2FE28308FD9F2A7BAF3
      SHA1:77DE68DAECD823BABBB58EDB1C8E14D7106E83BB
      SHA-256:4E07408562BEDB8B60CE05C1DECFE3AD16B72230967DE01F640B7E4729B49FCE
      SHA-512:3BAFBF08882A2D10133093A1B8433F50563B93C14ACD05B79028EB1D12799027241450980651994501423A66C276AE26C43B739BC65C4E16B10C3AF6C202AEBB
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:3
      Process:/tmp/na.elf
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):4
      Entropy (8bit):1.5
      Encrypted:false
      SSDEEP:3:MRV:Mz
      MD5:537D9B6C927223C796CAC288CCED29DF
      SHA1:EA10E810F96FCA6858E37FDA9832ACE147EED87C
      SHA-256:0D21AE129A64E1D19E4A94DFCA3A67C777E17374E9D4CA2F74B65647A88119EA
      SHA-512:6D4B04576201F789368F251EA231F5D2C0AE4CF17E95851D3AE10A1825724502732289F830E06247465F0284D4E33A9A120F6D730E62483515556DC1FD9CD120
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:1040
      Process:/usr/bin/crontab
      File Type:ASCII text
      Category:dropped
      Size (bytes):195
      Entropy (8bit):5.1261686109630755
      Encrypted:false
      SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQ3pFRXzMvZHGMQ5UYLtCFt3HY+z:8QjHig83FMJeHLUHY+
      MD5:03D1D1E8982AEDB377B9EA5465E7BC89
      SHA1:6140C2CFAB2725C796639F0B2492B435D1E166A2
      SHA-256:FE206D89AB7339EBDEB6EBDF29ED5062CA4F102B253E9B997DCEB3C8C0D09963
      SHA-512:48BE996F17D583E4CFA92C2C15DF0ACF7B0CA405766A41297599C6F8496B22A183794AA8E2518C231678CE2E2E69B46E79A4701DD8CBFE2A8FF0CF8DC69A01FF
      Malicious:true
      Reputation:low
      Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Sun Oct 13 00:08:53 2024).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot /tmp/na.elf.
      File type:ELF 32-bit LSB shared object, ARM, EABI5 version 1 (GNU/Linux), statically linked, stripped
      Entropy (8bit):7.9997984180584165
      TrID:
      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
      File name:na.elf
      File size:1'148'180 bytes
      MD5:0db5d6760b8306f85fb5ba89a794002e
      SHA1:c04eaab09aa7888f39c4330442c6f53a923d591e
      SHA256:7cd48d762a343b483d0ce857e5d2e30fc795d11a20f1827679b9a05d5ab75c3f
      SHA512:baa6d9b934ce1683177154e8bfb3a924189f65c0107fce31b605046617f8b69508d96cef18ae30b3e72617b9089cdb7a0c836625df2124ddb5bd0a26df1706c4
      SSDEEP:24576:OT/Gpdcd4QWGsLj1hhJkJcM6uui94ZVGbxxn844el8q/NK:AGpdpZj1VkJcAv94ZVGbzCIM
      TLSH:D0353321A0807E1053FAC9FAC1BDC49F1F066FDC6AF8D30A69505B466C916D7B70ACE9
      File Content Preview:.ELF..............(......oH.4...x.......4. ...(.........................T46...................7...7.................Q.td............................@S.eUPX!........Ll4.xl3................?.E.h;.......$.....G..3.=.T..k.h..U..#a.........!}....:.Y....G....w)

      ELF header

      Class:ELF32
      Data:2's complement, little endian
      Version:1 (current)
      Machine:ARM
      Version Number:0x1
      Type:DYN (Shared object file)
      OS/ABI:UNIX - Linux
      ABI Version:0
      Entry Point Address:0x486f84
      Flags:0x5000400
      ELF Header Size:52
      Program Header Offset:52
      Program Header Size:32
      Number of Program Headers:3
      Section Header Offset:1148024
      Section Header Size:40
      Number of Section Headers:3
      Header String Table Index:1
      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
      NULL0x00x00x00x00x0000
      .shstrtabSTRTAB0x00x1184240x1c0x00x0001
      .ARM.attributesARM_ATTRIBUTES0x00x1184400x350x00x0001
      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      LOAD0x00x00x00x10000x3634547.89890x6RW 0x10000
      LOAD0x00x3700000x3700000x11820a0x11820a7.99980x5R E0x10000
      GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
      Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

      System Behavior

      Start time (UTC):05:08:52
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:/tmp/na.elf
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:52
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:52
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:52
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v crontab >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:52
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:52
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/usr/bin/crontab
      Arguments:crontab -r
      File size:43720 bytes
      MD5 hash:66e521d421ac9b407699061bf21806f5

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/usr/bin/crontab
      Arguments:crontab -
      File size:43720 bytes
      MD5 hash:66e521d421ac9b407699061bf21806f5

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v php >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v nginx >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "which apache2"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/usr/bin/which
      Arguments:which apache2
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "which httpd"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/usr/bin/which
      Arguments:which httpd
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:53
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:57
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):05:08:57
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "iptables -I INPUT -p tcp --dport 35793 -j ACCEPT >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:57
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:08:57
      Start date (UTC):13/10/2024
      Path:/usr/sbin/iptables
      Arguments:iptables -I INPUT -p tcp --dport 35793 -j ACCEPT
      File size:99296 bytes
      MD5 hash:1ab05fef765b6342cdfadaa5275b33af