Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1532423
MD5:7dfd5aadee8bc76676cc567f4df1fb42
SHA1:807ed7bc9890103309dac1ca6b9290457387b435
SHA256:cebd34c54c9ac02902ef8554939cf6a34aa8f320ea051e0f3d67d91685a1abf0
Tags:elfuser-abuse_ch
Infos:

Detection

Xmrig
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Executes the "crontab" command typically for achieving persistence
Executes the "iptables" command to insert, remove and/or manipulate rules
Found strings related to Crypto-Mining
Sample is packed with UPX
Sample tries to persist itself using cron
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Executes the "rm" command used to delete files or directories
Reads system information from the proc file system
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532423
Start date and time:2024-10-13 07:08:41 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 42s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal76.troj.evad.mine.linELF@0/3@0/0
  • Skipping network analysis since amount of network traffic is too extensive
Command:/tmp/na.elf
PID:6301
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 6301, Parent: 6225, MD5: 02e8e39e1b46472a60d128a6da84a2b8) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 6303, Parent: 6301)
      • na.elf New Fork (PID: 6305, Parent: 6303)
      • sh (PID: 6305, Parent: 6303, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v crontab >/dev/null 2>&1"
      • na.elf New Fork (PID: 6307, Parent: 6303)
      • sh (PID: 6307, Parent: 6303, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
        • sh New Fork (PID: 6309, Parent: 6307)
        • crontab (PID: 6309, Parent: 6307, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -r
        • sh New Fork (PID: 6310, Parent: 6307)
        • sh New Fork (PID: 6311, Parent: 6307)
        • crontab (PID: 6311, Parent: 6307, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
      • na.elf New Fork (PID: 6312, Parent: 6303)
      • sh (PID: 6312, Parent: 6303, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v php >/dev/null 2>&1"
      • na.elf New Fork (PID: 6314, Parent: 6303)
      • sh (PID: 6314, Parent: 6303, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v nginx >/dev/null 2>&1"
      • na.elf New Fork (PID: 6316, Parent: 6303)
      • sh (PID: 6316, Parent: 6303, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "which apache2"
        • sh New Fork (PID: 6318, Parent: 6316)
        • which (PID: 6318, Parent: 6316, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: which apache2
      • na.elf New Fork (PID: 6319, Parent: 6303)
      • sh (PID: 6319, Parent: 6303, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "which httpd"
        • sh New Fork (PID: 6321, Parent: 6319)
        • which (PID: 6321, Parent: 6319, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: which httpd
      • na.elf New Fork (PID: 6322, Parent: 6303)
      • na.elf New Fork (PID: 6326, Parent: 6303)
      • sh (PID: 6326, Parent: 6303, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -I INPUT -p tcp --dport 60041 -j ACCEPT >/dev/null 2>&1"
        • sh New Fork (PID: 6332, Parent: 6326)
        • iptables (PID: 6332, Parent: 6326, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -I INPUT -p tcp --dport 60041 -j ACCEPT
  • dash New Fork (PID: 6409, Parent: 4334)
  • rm (PID: 6409, Parent: 4334, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.Af0o5XGEoP /tmp/tmp.kd6KiOuabn /tmp/tmp.uBdaIPQQTx
  • dash New Fork (PID: 6410, Parent: 4334)
  • rm (PID: 6410, Parent: 4334, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.Af0o5XGEoP /tmp/tmp.kd6KiOuabn /tmp/tmp.uBdaIPQQTx
  • cleanup
SourceRuleDescriptionAuthorStrings
6301.1.0000004000000000.0000004000396000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    Process Memory Space: na.elf PID: 6301JoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: na.elfReversingLabs: Detection: 18%
      Source: na.elfVirustotal: Detection: 15%Perma Link

      Bitcoin Miner

      barindex
      Source: Yara matchFile source: 6301.1.0000004000000000.0000004000396000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: na.elf PID: 6301, type: MEMORYSTR
      Source: na.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpString found in binary or memory: stratum+ssl://randomx.xmrig.com:443
      Source: na.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpString found in binary or memory: cryptonight/0
      Source: na.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpString found in binary or memory: stratum+tcp://

      Networking

      barindex
      Source: /bin/sh (PID: 6332)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 60041 -j ACCEPTJump to behavior
      Source: /bin/sh (PID: 6332)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 60041 -j ACCEPTJump to behavior
      Source: /tmp/na.elf (PID: 6303)Reads hosts file: /etc/hostsJump to behavior
      Source: /tmp/na.elf (PID: 6303)Socket: 0.0.0.0:60041Jump to behavior
      Source: na.elfString found in binary or memory: http://upx.sf.net
      Source: na.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpString found in binary or memory: https://gcc.gnu.org/bugs/):
      Source: na.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpString found in binary or memory: https://xmrig.com/wizard
      Source: na.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpString found in binary or memory: https://xmrig.com/wizard%s
      Source: LOAD without section mappingsProgram segment: 0x0
      Source: /tmp/na.elf (PID: 6303)SIGKILL sent: pid: 6285, result: successfulJump to behavior
      Source: /tmp/na.elf (PID: 6303)SIGKILL sent: pid: 6335, result: successfulJump to behavior
      Source: classification engineClassification label: mal76.troj.evad.mine.linELF@0/3@0/0

      Data Obfuscation

      barindex
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Id: UPX 4.23 Copyright (C) 1996-2024 the UPX Team. All Rights Reserved. $

      Persistence and Installation Behavior

      barindex
      Source: /bin/sh (PID: 6309)Crontab executable: /usr/bin/crontab -> crontab -rJump to behavior
      Source: /bin/sh (PID: 6311)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
      Source: /bin/sh (PID: 6332)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 60041 -j ACCEPTJump to behavior
      Source: /usr/bin/crontab (PID: 6311)File: /var/spool/cron/crontabs/tmp.Ckn82qJump to behavior
      Source: /usr/bin/crontab (PID: 6311)File: /var/spool/cron/crontabs/rootJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1582/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1582/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1582/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1582/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1582/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/3088/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/3088/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/3088/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/3088/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/3088/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/230/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/230/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/230/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/230/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/230/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/230/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/232/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/232/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/232/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/232/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/232/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/232/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1579/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1579/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1579/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1579/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1579/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1699/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1699/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1699/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1699/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1699/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1335/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1335/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1335/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1335/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1335/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1335/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1698/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1698/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1698/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1698/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1698/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1334/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1334/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1334/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1334/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1334/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1334/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1576/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1576/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1576/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1576/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6303)File opened: /proc/1576/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 6305)Shell command executed: sh -c "command -v crontab >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 6307)Shell command executed: sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"Jump to behavior
      Source: /tmp/na.elf (PID: 6312)Shell command executed: sh -c "command -v php >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 6314)Shell command executed: sh -c "command -v nginx >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 6316)Shell command executed: sh -c "which apache2"Jump to behavior
      Source: /tmp/na.elf (PID: 6319)Shell command executed: sh -c "which httpd"Jump to behavior
      Source: /tmp/na.elf (PID: 6326)Shell command executed: sh -c "iptables -I INPUT -p tcp --dport 60041 -j ACCEPT >/dev/null 2>&1"Jump to behavior
      Source: /bin/sh (PID: 6332)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 60041 -j ACCEPTJump to behavior
      Source: /usr/bin/dash (PID: 6409)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Af0o5XGEoP /tmp/tmp.kd6KiOuabn /tmp/tmp.uBdaIPQQTxJump to behavior
      Source: /usr/bin/dash (PID: 6410)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Af0o5XGEoP /tmp/tmp.kd6KiOuabn /tmp/tmp.uBdaIPQQTxJump to behavior
      Source: /tmp/na.elf (PID: 6303)Reads from proc file: /proc/meminfoJump to behavior
      Source: na.elfSubmission file: segment LOAD with 7.806 entropy (max. 8.0)
      Source: na.elfSubmission file: segment LOAD with 7.9998 entropy (max. 8.0)
      Source: /tmp/na.elf (PID: 6301)Queries kernel information via 'uname': Jump to behavior
      Source: /tmp/na.elf (PID: 6303)Queries kernel information via 'uname': Jump to behavior
      Source: na.elf, 6301.1.00005624dfc43000.00005624dfd4d000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/aarch64
      Source: na.elf, 6301.1.00007ffe5909f000.00007ffe590c0000.rw-.sdmpBinary or memory string: qx86_64/usr/bin/qemu-aarch64/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
      Source: na.elf, 6301.1.00005624dfc43000.00005624dfd4d000.rw-.sdmpBinary or memory string: $V1/etc/qemu-binfmt/aarch64O
      Source: na.elf, 6301.1.00007ffe5909f000.00007ffe590c0000.rw-.sdmpBinary or memory string: /usr/bin/qemu-aarch64
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      11
      Obfuscated Files or Information
      1
      OS Credential Dumping
      11
      Security Software Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Scripting
      Boot or Logon Initialization Scripts1
      File Deletion
      LSASS Memory1
      File and Directory Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
      System Network Configuration Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532423 Sample: na.elf Startdate: 13/10/2024 Architecture: LINUX Score: 76 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected Xmrig cryptocurrency miner 2->43 45 Sample is packed with UPX 2->45 8 na.elf 2->8         started        11 dash rm 2->11         started        13 dash rm 2->13         started        process3 signatures4 47 Found strings related to Crypto-Mining 8->47 15 na.elf 8->15         started        process5 process6 17 na.elf sh 15->17         started        19 na.elf sh 15->19         started        21 na.elf sh 15->21         started        23 5 other processes 15->23 process7 25 sh crontab 17->25         started        29 sh crontab 17->29         started        31 sh 17->31         started        33 sh iptables 19->33         started        35 sh which 21->35         started        37 sh which 23->37         started        file8 39 /var/spool/cron/crontabs/tmp.Ckn82q, ASCII 25->39 dropped 49 Sample tries to persist itself using cron 25->49 51 Executes the "crontab" command typically for achieving persistence 25->51 53 Executes the "iptables" command to insert, remove and/or manipulate rules 33->53 signatures9
      SourceDetectionScannerLabelLink
      na.elf18%ReversingLabsLinux.Trojan.Generic
      na.elf16%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://gcc.gnu.org/bugs/):0%URL Reputationsafe
      http://upx.sf.net0%URL Reputationsafe
      https://xmrig.com/wizard%s2%VirustotalBrowse
      https://xmrig.com/wizard2%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://gcc.gnu.org/bugs/):na.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpfalse
      • URL Reputation: safe
      unknown
      http://upx.sf.netna.elftrue
      • URL Reputation: safe
      unknown
      https://xmrig.com/wizardna.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpfalseunknown
      https://xmrig.com/wizard%sna.elf, 6301.1.0000004000000000.0000004000396000.r-x.sdmpfalseunknown
      No contacted IP infos
      No context
      No context
      No context
      No context
      No context
      Process:/tmp/na.elf
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:W:W
      MD5:ECCBC87E4B5CE2FE28308FD9F2A7BAF3
      SHA1:77DE68DAECD823BABBB58EDB1C8E14D7106E83BB
      SHA-256:4E07408562BEDB8B60CE05C1DECFE3AD16B72230967DE01F640B7E4729B49FCE
      SHA-512:3BAFBF08882A2D10133093A1B8433F50563B93C14ACD05B79028EB1D12799027241450980651994501423A66C276AE26C43B739BC65C4E16B10C3AF6C202AEBB
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:3
      Process:/tmp/na.elf
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):4
      Entropy (8bit):1.5
      Encrypted:false
      SSDEEP:3:MRV:Mz
      MD5:537D9B6C927223C796CAC288CCED29DF
      SHA1:EA10E810F96FCA6858E37FDA9832ACE147EED87C
      SHA-256:0D21AE129A64E1D19E4A94DFCA3A67C777E17374E9D4CA2F74B65647A88119EA
      SHA-512:6D4B04576201F789368F251EA231F5D2C0AE4CF17E95851D3AE10A1825724502732289F830E06247465F0284D4E33A9A120F6D730E62483515556DC1FD9CD120
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:1040
      Process:/usr/bin/crontab
      File Type:ASCII text
      Category:dropped
      Size (bytes):195
      Entropy (8bit):5.09791335453063
      Encrypted:false
      SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQ3pFmEZHGMQ5UYLtCFt3HY+z:8QjHig83teHLUHY+
      MD5:C759F384E6BEB457A406B3F809CC638F
      SHA1:DA9F4B80514D345F1041DE523FD0A1521B1B8874
      SHA-256:18725B6F8FBB1A2016D23A66FB7AD36DF9B08FB3AD9D9D1F90F832F069C459A3
      SHA-512:5C23FEEC06F4917BEEDB9BB69A8B964470D28845C8A00F1CD7AD496502C5B333D28EA493EC70013C8C50C7040178D05A40ADCE4156F888CBC57A5AE249D79787
      Malicious:true
      Reputation:low
      Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Sun Oct 13 00:09:42 2024).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot /tmp/na.elf.
      File type:ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), statically linked, no section header
      Entropy (8bit):7.999837187538898
      TrID:
      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
      File name:na.elf
      File size:1'394'164 bytes
      MD5:7dfd5aadee8bc76676cc567f4df1fb42
      SHA1:807ed7bc9890103309dac1ca6b9290457387b435
      SHA256:cebd34c54c9ac02902ef8554939cf6a34aa8f320ea051e0f3d67d91685a1abf0
      SHA512:3120187ec1a11f4cf24e4e166cd9c7639607f64ba5107941b5756b31bf32ff246a70584c3d7fa795cd69c950aba7aa0ce81a2dc5d2695f94655c2f0d00024b83
      SSDEEP:24576:uiinhQirfJbHFMLbdfMioGcVzU0QWwNnTkT4bW4ufRBIho8zerpO:uiK/rfnodfMioHVzU0QRnTkT4bP4BIhp
      TLSH:665533EE3CF02BEEE8D8CBC4880C8C10E9D07AD8F56D369658796565BD7658E21770E0
      File Content Preview:.ELF.....................0S.....@...................@.8...................................................=...............................>.......>......C.......C..............Q.td........................................................UPX!...*......;..S9

      ELF header

      Class:ELF64
      Data:2's complement, little endian
      Version:1 (current)
      Machine:AArch64
      Version Number:0x1
      Type:DYN (Shared object file)
      OS/ABI:UNIX - System V
      ABI Version:0
      Entry Point Address:0x533004
      Flags:0x0
      ELF Header Size:64
      Program Header Offset:64
      Program Header Size:56
      Number of Program Headers:3
      Section Header Offset:0
      Section Header Size:0
      Number of Section Headers:0
      Header String Table Index:0
      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      LOAD0x00x00x00x10000x3d04907.80600x6RW 0x10000
      LOAD0x00x3e00000x3e00000x1543ca0x1543ca7.99980x5R E0x10000
      GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
      Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

      System Behavior

      Start time (UTC):05:09:41
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:/tmp/na.elf
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v crontab >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/usr/bin/crontab
      Arguments:crontab -r
      File size:43720 bytes
      MD5 hash:66e521d421ac9b407699061bf21806f5

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/usr/bin/crontab
      Arguments:crontab -
      File size:43720 bytes
      MD5 hash:66e521d421ac9b407699061bf21806f5

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v php >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v nginx >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "which apache2"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/usr/bin/which
      Arguments:which apache2
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "which httpd"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/usr/bin/which
      Arguments:which httpd
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:42
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:48
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:5706200 bytes
      MD5 hash:02e8e39e1b46472a60d128a6da84a2b8

      Start time (UTC):05:09:48
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "iptables -I INPUT -p tcp --dport 60041 -j ACCEPT >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:49
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:09:49
      Start date (UTC):13/10/2024
      Path:/usr/sbin/iptables
      Arguments:iptables -I INPUT -p tcp --dport 60041 -j ACCEPT
      File size:99296 bytes
      MD5 hash:1ab05fef765b6342cdfadaa5275b33af

      Start time (UTC):05:10:19
      Start date (UTC):13/10/2024
      Path:/usr/bin/dash
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:10:19
      Start date (UTC):13/10/2024
      Path:/usr/bin/rm
      Arguments:rm -f /tmp/tmp.Af0o5XGEoP /tmp/tmp.kd6KiOuabn /tmp/tmp.uBdaIPQQTx
      File size:72056 bytes
      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

      Start time (UTC):05:10:19
      Start date (UTC):13/10/2024
      Path:/usr/bin/dash
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:10:19
      Start date (UTC):13/10/2024
      Path:/usr/bin/rm
      Arguments:rm -f /tmp/tmp.Af0o5XGEoP /tmp/tmp.kd6KiOuabn /tmp/tmp.uBdaIPQQTx
      File size:72056 bytes
      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b