Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1532510
MD5: b01ea76042e6377d1aaa8e097caeba3a
SHA1: 00a1fcfbfe8636a0a3aa494538f8ca1a721b118c
SHA256: d480d0a47af9cddc5c06547f6bd7af53f9b5eba2276015732a9132d0f5760269
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 23
Range: 0 - 100
Whitelisted: false

Signatures

Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Source: na.elf String: ash|login|wget|curl|tftp|ntpdate
Source: na.elf String: /proc//exe|ash|login|wget|curl|tftp|ntpdate/fdsocket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/

Networking

barindex
Source: global traffic TCP traffic: 156.244.16.207 ports 1,5,7,8,9,15987
Source: global traffic TCP traffic: 192.168.2.23:47124 -> 156.244.16.207:15987
Source: /tmp/na.elf (PID: 6248) Socket: 127.0.0.1:1234 Jump to behavior
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown UDP traffic detected without corresponding DNS query: 192.3.165.37
Source: global traffic DNS traffic detected: DNS query: 75cents.libre
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: sus23.troj.linELF@0/0@1/0
Source: /usr/bin/dash (PID: 6236) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.gWYdqRNfSr /tmp/tmp.zlfH7XbY54 /tmp/tmp.0IyubbBDRk Jump to behavior
Source: /usr/bin/dash (PID: 6237) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.gWYdqRNfSr /tmp/tmp.zlfH7XbY54 /tmp/tmp.0IyubbBDRk Jump to behavior
Source: /tmp/na.elf (PID: 6248) Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 6248.1.000055e368535000.000055e368683000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: na.elf, 6248.1.00007fff1000a000.00007fff1002b000.rw-.sdmp Binary or memory string: ?x86_64/usr/bin/qemu-arm/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 6248.1.000055e368535000.000055e368683000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: na.elf, 6248.1.00007fff1000a000.00007fff1002b000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs