Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1532424
MD5:8087c36ad6c48d8871089112ba7e86c8
SHA1:f1cab2cf7c94b3b06f23f291d42bc7c1b246dcea
SHA256:f1f34b7b798f8ec472b69eb5bd196381d749ced4d4a461d563896dfa827c84b6
Tags:elfuser-abuse_ch
Infos:

Detection

Xmrig
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Executes the "crontab" command typically for achieving persistence
Executes the "iptables" command to insert, remove and/or manipulate rules
Found strings related to Crypto-Mining
Sample is packed with UPX
Sample tries to persist itself using cron
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Reads system information from the proc file system
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532424
Start date and time:2024-10-13 07:12:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 27s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal84.troj.evad.mine.linELF@0/3@0/0
  • Skipping network analysis since amount of network traffic is too extensive
Command:/tmp/na.elf
PID:5493
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5493, Parent: 5413, MD5: 8087c36ad6c48d8871089112ba7e86c8) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5494, Parent: 5493)
      • na.elf New Fork (PID: 5495, Parent: 5494)
      • sh (PID: 5495, Parent: 5494, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v crontab >/dev/null 2>&1"
      • na.elf New Fork (PID: 5496, Parent: 5494)
      • sh (PID: 5496, Parent: 5494, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
        • sh New Fork (PID: 5497, Parent: 5496)
        • crontab (PID: 5497, Parent: 5496, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -r
        • sh New Fork (PID: 5498, Parent: 5496)
        • sh New Fork (PID: 5499, Parent: 5496)
        • crontab (PID: 5499, Parent: 5496, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
      • na.elf New Fork (PID: 5500, Parent: 5494)
      • sh (PID: 5500, Parent: 5494, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v php >/dev/null 2>&1"
      • na.elf New Fork (PID: 5501, Parent: 5494)
      • sh (PID: 5501, Parent: 5494, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "command -v nginx >/dev/null 2>&1"
      • na.elf New Fork (PID: 5502, Parent: 5494)
      • sh (PID: 5502, Parent: 5494, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "which apache2"
        • sh New Fork (PID: 5503, Parent: 5502)
        • which (PID: 5503, Parent: 5502, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: which apache2
      • na.elf New Fork (PID: 5504, Parent: 5494)
      • sh (PID: 5504, Parent: 5494, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "which httpd"
        • sh New Fork (PID: 5505, Parent: 5504)
        • which (PID: 5505, Parent: 5504, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: which httpd
      • na.elf New Fork (PID: 5506, Parent: 5494)
      • na.elf New Fork (PID: 5509, Parent: 5494)
      • sh (PID: 5509, Parent: 5494, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -I INPUT -p tcp --dport 50101 -j ACCEPT >/dev/null 2>&1"
        • sh New Fork (PID: 5510, Parent: 5509)
        • iptables (PID: 5510, Parent: 5509, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -I INPUT -p tcp --dport 50101 -j ACCEPT
  • cleanup
SourceRuleDescriptionAuthorStrings
5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpLinux_Cryptominer_Camelot_b8552fffunknownunknown
    • 0x83e52:$a: 18 8B 44 24 1C 8B 50 0C 83 E8 04 8B 0A FF 74 24 28 FF 74 24 28 FF 74
    • 0x83e82:$a: 18 8B 44 24 1C 8B 50 0C 83 E8 04 8B 0A FF 74 24 28 FF 74 24 28 FF 74
    • 0x83eb2:$a: 18 8B 44 24 1C 8B 50 0C 83 E8 04 8B 0A FF 74 24 28 FF 74 24 28 FF 74
    • 0x83ee2:$a: 18 8B 44 24 1C 8B 50 0C 83 E8 04 8B 0A FF 74 24 28 FF 74 24 28 FF 74
    Process Memory Space: na.elf PID: 5493JoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: na.elfReversingLabs: Detection: 39%
      Source: na.elfVirustotal: Detection: 28%Perma Link

      Bitcoin Miner

      barindex
      Source: Yara matchFile source: 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: na.elf PID: 5493, type: MEMORYSTR
      Source: na.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpString found in binary or memory: stratum+ssl://randomx.xmrig.com:443
      Source: na.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpString found in binary or memory: cryptonight/0
      Source: na.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpString found in binary or memory: stratum+tcp://

      Networking

      barindex
      Source: /bin/sh (PID: 5510)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 50101 -j ACCEPTJump to behavior
      Source: /bin/sh (PID: 5510)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 50101 -j ACCEPTJump to behavior
      Source: /tmp/na.elf (PID: 5494)Reads hosts file: /etc/hostsJump to behavior
      Source: /tmp/na.elf (PID: 5494)Socket: 0.0.0.0:50101Jump to behavior
      Source: na.elfString found in binary or memory: http://upx.sf.net
      Source: na.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpString found in binary or memory: https://gcc.gnu.org/bugs/):
      Source: na.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpString found in binary or memory: https://xmrig.com/wizard
      Source: na.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpString found in binary or memory: https://xmrig.com/wizard%s

      System Summary

      barindex
      Source: 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmp, type: MEMORYMatched rule: Linux_Cryptominer_Camelot_b8552fff Author: unknown
      Source: LOAD without section mappingsProgram segment: 0x0
      Source: /tmp/na.elf (PID: 5494)SIGKILL sent: pid: 5473, result: successfulJump to behavior
      Source: /tmp/na.elf (PID: 5494)SIGKILL sent: pid: 5513, result: successfulJump to behavior
      Source: 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmp, type: MEMORYMatched rule: Linux_Cryptominer_Camelot_b8552fff reference_sample = cdd3d567fbcbdd6799afad241ae29acbe4ab549445e5c4fc0678d16e75b40dfa, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Cryptominer.Camelot, fingerprint = d5998e0bf7df96dd21d404658589fb37b405398bd3585275419169b30c72ce62, id = b8552fff-29a9-4e09-810a-b4b52a7a3fb4, last_modified = 2021-09-16
      Source: classification engineClassification label: mal84.troj.evad.mine.linELF@0/3@0/0

      Data Obfuscation

      barindex
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Id: UPX 4.23 Copyright (C) 1996-2024 the UPX Team. All Rights Reserved. $

      Persistence and Installation Behavior

      barindex
      Source: /bin/sh (PID: 5497)Crontab executable: /usr/bin/crontab -> crontab -rJump to behavior
      Source: /bin/sh (PID: 5499)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
      Source: /bin/sh (PID: 5510)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 50101 -j ACCEPTJump to behavior
      Source: /usr/bin/crontab (PID: 5499)File: /var/spool/cron/crontabs/tmp.NT5FO0Jump to behavior
      Source: /usr/bin/crontab (PID: 5499)File: /var/spool/cron/crontabs/rootJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3760/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3761/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1583/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/2672/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/3759/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/1577/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5494)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/na.elf (PID: 5495)Shell command executed: sh -c "command -v crontab >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 5496)Shell command executed: sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"Jump to behavior
      Source: /tmp/na.elf (PID: 5500)Shell command executed: sh -c "command -v php >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 5501)Shell command executed: sh -c "command -v nginx >/dev/null 2>&1"Jump to behavior
      Source: /tmp/na.elf (PID: 5502)Shell command executed: sh -c "which apache2"Jump to behavior
      Source: /tmp/na.elf (PID: 5504)Shell command executed: sh -c "which httpd"Jump to behavior
      Source: /tmp/na.elf (PID: 5509)Shell command executed: sh -c "iptables -I INPUT -p tcp --dport 50101 -j ACCEPT >/dev/null 2>&1"Jump to behavior
      Source: /bin/sh (PID: 5510)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p tcp --dport 50101 -j ACCEPTJump to behavior
      Source: /tmp/na.elf (PID: 5494)Reads from proc file: /proc/meminfoJump to behavior
      Source: na.elfSubmission file: segment LOAD with 7.8935 entropy (max. 8.0)
      Source: na.elfSubmission file: segment LOAD with 7.9999 entropy (max. 8.0)
      Source: /tmp/na.elf (PID: 5494)Queries kernel information via 'uname': Jump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      11
      Obfuscated Files or Information
      1
      OS Credential Dumping
      1
      Security Software Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Scripting
      Boot or Logon Initialization ScriptsRootkitLSASS Memory1
      File and Directory Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
      System Network Configuration Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532424 Sample: na.elf Startdate: 13/10/2024 Architecture: LINUX Score: 84 37 Malicious sample detected (through community Yara rule) 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 Yara detected Xmrig cryptocurrency miner 2->41 43 Sample is packed with UPX 2->43 8 na.elf 2->8         started        process3 signatures4 51 Found strings related to Crypto-Mining 8->51 11 na.elf 8->11         started        process5 process6 13 na.elf sh 11->13         started        15 na.elf sh 11->15         started        17 na.elf sh 11->17         started        19 5 other processes 11->19 process7 21 sh crontab 13->21         started        25 sh crontab 13->25         started        27 sh 13->27         started        29 sh iptables 15->29         started        31 sh which 17->31         started        33 sh which 19->33         started        file8 35 /var/spool/cron/crontabs/tmp.NT5FO0, ASCII 21->35 dropped 45 Sample tries to persist itself using cron 21->45 47 Executes the "crontab" command typically for achieving persistence 21->47 49 Executes the "iptables" command to insert, remove and/or manipulate rules 29->49 signatures9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      na.elf39%ReversingLabsLinux.Coinminer.Generic
      na.elf29%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://gcc.gnu.org/bugs/):0%URL Reputationsafe
      https://gcc.gnu.org/bugs/):0%URL Reputationsafe
      http://upx.sf.net0%URL Reputationsafe
      https://xmrig.com/wizard%s2%VirustotalBrowse
      https://xmrig.com/wizard2%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://gcc.gnu.org/bugs/):na.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://upx.sf.netna.elftrue
      • URL Reputation: safe
      unknown
      https://xmrig.com/wizardna.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpfalseunknown
      https://xmrig.com/wizard%sna.elf, 5493.1.00000000f7930000.00000000f7de0000.r-x.sdmpfalseunknown
      No contacted IP infos
      No context
      No context
      No context
      No context
      No context
      Process:/tmp/na.elf
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:W:W
      MD5:ECCBC87E4B5CE2FE28308FD9F2A7BAF3
      SHA1:77DE68DAECD823BABBB58EDB1C8E14D7106E83BB
      SHA-256:4E07408562BEDB8B60CE05C1DECFE3AD16B72230967DE01F640B7E4729B49FCE
      SHA-512:3BAFBF08882A2D10133093A1B8433F50563B93C14ACD05B79028EB1D12799027241450980651994501423A66C276AE26C43B739BC65C4E16B10C3AF6C202AEBB
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:3
      Process:/tmp/na.elf
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):4
      Entropy (8bit):1.5
      Encrypted:false
      SSDEEP:3:MRV:Mz
      MD5:537D9B6C927223C796CAC288CCED29DF
      SHA1:EA10E810F96FCA6858E37FDA9832ACE147EED87C
      SHA-256:0D21AE129A64E1D19E4A94DFCA3A67C777E17374E9D4CA2F74B65647A88119EA
      SHA-512:6D4B04576201F789368F251EA231F5D2C0AE4CF17E95851D3AE10A1825724502732289F830E06247465F0284D4E33A9A120F6D730E62483515556DC1FD9CD120
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:1040
      Process:/usr/bin/crontab
      File Type:ASCII text
      Category:dropped
      Size (bytes):195
      Entropy (8bit):5.113279828491398
      Encrypted:false
      SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQ3pFOhZHGMQ5UYLtCFt3HY+z:8QjHig83+3eHLUHY+
      MD5:42F63B52A8C008CD051CC75A35D290B4
      SHA1:5AF923C65FE602F004705D5B85D401BB4EF81C0C
      SHA-256:343DDCF7DE59098401505D4716C1CAAD725665A8D90DB42B36A8113838E0F0C6
      SHA-512:67D0E0C290FF42E18DF06F445D6D90472F5BCF9314E792218089C1C9588B0EA19A065097B5A6116E194308C4D89E08E0390D03C0C2E5FB6E7ED2EA1E38C46622
      Malicious:true
      Reputation:low
      Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Sun Oct 13 00:12:54 2024).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot /tmp/na.elf.
      File type:ELF 32-bit LSB shared object, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
      Entropy (8bit):7.999856524278898
      TrID:
      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
      File name:na.elf
      File size:1'647'852 bytes
      MD5:8087c36ad6c48d8871089112ba7e86c8
      SHA1:f1cab2cf7c94b3b06f23f291d42bc7c1b246dcea
      SHA256:f1f34b7b798f8ec472b69eb5bd196381d749ced4d4a461d563896dfa827c84b6
      SHA512:b6f69551bbf8ba0dfe50aedcf222a457c829f0b47d4b14dd69de39721aa036c827b16bf903242773350b9cd00f3e059db6138adb20cb0d8981c3a73f80d47387
      SSDEEP:24576:iSOMGoq9mdCBgPcpjqnQ9KiDIGpjPEBNNKBDB2qejN8O4xuJsIu7FiiExxg25Kej:owVYqnQ9KSIKTqK7ejNz4UJsteEJs
      TLSH:D775337BD53D0A5EF635F4BC20A2442A4C13C5958C107FA98C763B2E6681C742A6FE7E
      File Content Preview:.ELF......................e.4...........4. .............................(.L...................L...L.."..."..........Q.td................................UPX!..........K.!.J.T...........<..?.E.`...X..)....r.}GK....6/....Q.Zl...S..7p......S...l..w....\...\..

      ELF header

      Class:ELF32
      Data:2's complement, little endian
      Version:1 (current)
      Machine:Intel 80386
      Version Number:0x1
      Type:DYN (Shared object file)
      OS/ABI:UNIX - Linux
      ABI Version:0
      Entry Point Address:0x65dfb8
      Flags:0x0
      ELF Header Size:52
      Program Header Offset:52
      Program Header Size:32
      Number of Program Headers:3
      Section Header Offset:0
      Section Header Size:0
      Number of Section Headers:0
      Header String Table Index:0
      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      LOAD0x00x00x00x10000x4cce287.89350x6RW 0x1000
      LOAD0x00x4cd0000x4cd0000x1922a10x1922a17.99990x5R E0x1000
      GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
      Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

      System Behavior

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:/tmp/na.elf
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v crontab >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/usr/bin/crontab
      Arguments:crontab -r
      File size:43720 bytes
      MD5 hash:66e521d421ac9b407699061bf21806f5

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/usr/bin/crontab
      Arguments:crontab -
      File size:43720 bytes
      MD5 hash:66e521d421ac9b407699061bf21806f5

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v php >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "command -v nginx >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "which apache2"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/usr/bin/which
      Arguments:which apache2
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "which httpd"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:54
      Start date (UTC):13/10/2024
      Path:/usr/bin/which
      Arguments:which httpd
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:12:55
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:13:00
      Start date (UTC):13/10/2024
      Path:/tmp/na.elf
      Arguments:-
      File size:1647852 bytes
      MD5 hash:8087c36ad6c48d8871089112ba7e86c8

      Start time (UTC):05:13:00
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:sh -c "iptables -I INPUT -p tcp --dport 50101 -j ACCEPT >/dev/null 2>&1"
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:13:00
      Start date (UTC):13/10/2024
      Path:/bin/sh
      Arguments:-
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      Start time (UTC):05:13:00
      Start date (UTC):13/10/2024
      Path:/usr/sbin/iptables
      Arguments:iptables -I INPUT -p tcp --dport 50101 -j ACCEPT
      File size:99296 bytes
      MD5 hash:1ab05fef765b6342cdfadaa5275b33af