Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1532511
MD5:6b37b50698fda05e7bc14009e3048371
SHA1:eafe84f6e509ff395149539e627259317e555625
SHA256:2f28fce22a9a9b38f627a5b21d3451fe412fad23a092448a9bb044ee3b036985
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Connects to many ports of the same IP (likely port scanning)
Deletes system log files
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532511
Start date and time:2024-10-13 15:19:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 14s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal52.troj.evad.linELF@0/0@3/0
Command:/tmp/na.elf
PID:5414
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB lEarNs nOthinG xd
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5414, Parent: 5339, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5422, Parent: 5414)
    • na.elf New Fork (PID: 5424, Parent: 5414)
    • na.elf New Fork (PID: 5426, Parent: 5414)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: na.elfString: ash|login|wget|curl|tftp|ntpdate
Source: na.elfString: l/proc//exe|ash|login|wget|curl|tftp|ntpdate/fdsocket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/

Networking

barindex
Source: global trafficTCP traffic: 38.60.249.66 ports 54123,1,2,3,4,5
Source: global trafficTCP traffic: 192.168.2.13:57038 -> 38.60.249.66:54123
Source: /tmp/na.elf (PID: 5414)Socket: 127.0.0.1:1234Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 192.3.165.37
Source: global trafficDNS traffic detected: DNS query: eighteen.pirate
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.evad.linELF@0/0@3/0

Data Obfuscation

barindex
Source: /tmp/na.elf (PID: 5424)File: /etc/configJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /root/.cacheJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /root/.sshJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /root/.configJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /root/.localJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /tmp/.X11-unixJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /tmp/.Test-unixJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /tmp/.font-unixJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /tmp/.ICE-unixJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /tmp/.XIM-unixJump to behavior
Source: /tmp/na.elf (PID: 5424)Directory: /etc/.javaJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5424)Log files deleted: /var/log/kern.logJump to behavior
Source: /tmp/na.elf (PID: 5414)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5414.1.00007ffe9116c000.00007ffe9118d000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5414.1.000055686030d000.0000556860370000.rw-.sdmpBinary or memory string: 0`hU5!/etc/qemu-binfmt/sh4
Source: na.elf, 5414.1.00007ffe9116c000.00007ffe9118d000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
Source: na.elf, 5414.1.000055686030d000.0000556860370000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Indicator Removal
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532511 Sample: na.elf Startdate: 13/10/2024 Architecture: LINUX Score: 52 16 eighteen.pirate 38.60.249.66, 54123, 57038 COGENT-174US United States 2->16 18 daisy.ubuntu.com 2->18 20 Connects to many ports of the same IP (likely port scanning) 2->20 7 na.elf 2->7         started        signatures3 process4 process5 9 na.elf 7->9         started        12 na.elf 7->12         started        14 na.elf 7->14         started        signatures6 22 Sample tries to access files in /etc/config/ (typical for OpenWRT routers) 9->22 24 Deletes system log files 9->24
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalseunknown
eighteen.pirate
38.60.249.66
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    38.60.249.66
    eighteen.pirateUnited States
    174COGENT-174UStrue
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    38.60.249.66na.elfGet hashmaliciousUnknownBrowse
      na.elfGet hashmaliciousUnknownBrowse
        na.elfGet hashmaliciousUnknownBrowse
          na.elfGet hashmaliciousUnknownBrowse
            na.elfGet hashmaliciousUnknownBrowse
              GfPpov52Oc.elfGet hashmaliciousUnknownBrowse
                na.elfGet hashmaliciousUnknownBrowse
                  na.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousUnknownBrowse
                      na.elfGet hashmaliciousUnknownBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.comarm5.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        arm6.elfGet hashmaliciousMirai, MoobotBrowse
                        • 162.213.35.24
                        debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                        • 162.213.35.25
                        0h7AeM6QgB.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        na.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        eighteen.piratena.elfGet hashmaliciousUnknownBrowse
                        • 38.60.249.66
                        na.elfGet hashmaliciousUnknownBrowse
                        • 38.60.249.66
                        na.elfGet hashmaliciousUnknownBrowse
                        • 38.60.249.66
                        na.elfGet hashmaliciousMiraiBrowse
                        • 38.60.249.66
                        na.elfGet hashmaliciousUnknownBrowse
                        • 38.60.249.66
                        na.elfGet hashmaliciousUnknownBrowse
                        • 38.60.249.66
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        COGENT-174USdebug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                        • 204.243.128.148
                        SecuriteInfo.com.Win32.TrojanX-gen.16449.26967.exeGet hashmaliciousUnknownBrowse
                        • 149.104.74.87
                        SecuriteInfo.com.Win32.TrojanX-gen.16449.26967.exeGet hashmaliciousUnknownBrowse
                        • 38.54.26.75
                        m0mg1WH7Su.elfGet hashmaliciousMiraiBrowse
                        • 38.14.172.49
                        PeleHfdpzX.elfGet hashmaliciousMiraiBrowse
                        • 38.139.235.111
                        ULRmk7oYR7.elfGet hashmaliciousMiraiBrowse
                        • 149.110.96.196
                        na.elfGet hashmaliciousMiraiBrowse
                        • 38.45.244.222
                        na.elfGet hashmaliciousMiraiBrowse
                        • 38.161.13.62
                        na.elfGet hashmaliciousMiraiBrowse
                        • 23.237.211.213
                        na.htaGet hashmaliciousCobalt StrikeBrowse
                        • 38.240.44.9
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.881793802579038
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:na.elf
                        File size:48'932 bytes
                        MD5:6b37b50698fda05e7bc14009e3048371
                        SHA1:eafe84f6e509ff395149539e627259317e555625
                        SHA256:2f28fce22a9a9b38f627a5b21d3451fe412fad23a092448a9bb044ee3b036985
                        SHA512:2c29c03a6152f821bfbc454048807b4de2103cb361d380fde2be41d112c1c03fa2690c44fb0142fd8dd591873c6adbd1aa85e279fc63f03691005d7f56235fc7
                        SSDEEP:768:RFJL+YSqQ1XgqdDxAH4qmDKq07ZonHW/VCDU:Rv+YTiX9dDxQ4qmuq07enQVCD
                        TLSH:5F237C6BDC696E58D96C94B4F5309B7E5F53A911D9071FFA8263823AC003EDCF8092B4
                        File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@.p...p...............t...t.A.t.A.....LE..........Q.td............................././"O.n........#.*@........#.*@L....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:<unknown>
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x4001a0
                        Flags:0x9
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:48532
                        Section Header Size:40
                        Number of Section Headers:10
                        Header String Table Index:9
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x4000940x940x300x00x6AX004
                        .textPROGBITS0x4000e00xe00xa8600x00x6AX0032
                        .finiPROGBITS0x40a9400xa9400x240x00x6AX004
                        .rodataPROGBITS0x40a9640xa9640x110c0x00x2A004
                        .ctorsPROGBITS0x41ba740xba740x80x00x3WA004
                        .dtorsPROGBITS0x41ba7c0xba7c0x80x00x3WA004
                        .dataPROGBITS0x41ba880xba880x2cc0x00x3WA004
                        .bssNOBITS0x41bd540xbd540x426c0x00x3WA004
                        .shstrtabSTRTAB0x00xbd540x3e0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x4000000x4000000xba700xba706.92770x5R E0x10000.init .text .fini .rodata
                        LOAD0xba740x41ba740x41ba740x2e00x454c3.82670x6RW 0x10000.ctors .dtors .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 13, 2024 15:20:06.810636997 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:20:06.816962004 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:20:06.817157984 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:20:06.817493916 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:20:06.822550058 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:20:15.380848885 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:20:15.380937099 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:20:30.396589041 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:20:30.401711941 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:20:45.882443905 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:20:45.882823944 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:21:50.983125925 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:21:50.983468056 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:22:05.995438099 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:22:06.000906944 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:22:10.696614027 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:22:10.696674109 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:22:10.696687937 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:22:10.697118044 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:22:10.697118998 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:22:10.697204113 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:22:10.921639919 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:22:10.922055960 CEST5703854123192.168.2.1338.60.249.66
                        Oct 13, 2024 15:23:06.302335024 CEST541235703838.60.249.66192.168.2.13
                        Oct 13, 2024 15:23:06.302613020 CEST5703854123192.168.2.1338.60.249.66
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 13, 2024 15:20:05.972654104 CEST5667953192.168.2.13192.3.165.37
                        Oct 13, 2024 15:20:06.807904005 CEST5356679192.3.165.37192.168.2.13
                        Oct 13, 2024 15:22:49.173013926 CEST4096253192.168.2.138.8.8.8
                        Oct 13, 2024 15:22:49.173013926 CEST5400253192.168.2.138.8.8.8
                        Oct 13, 2024 15:22:49.179680109 CEST53409628.8.8.8192.168.2.13
                        Oct 13, 2024 15:22:49.180115938 CEST53540028.8.8.8192.168.2.13
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Oct 13, 2024 15:20:05.972654104 CEST192.168.2.13192.3.165.370x9078Standard query (0)eighteen.pirateA (IP address)IN (0x0001)false
                        Oct 13, 2024 15:22:49.173013926 CEST192.168.2.138.8.8.80x6887Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Oct 13, 2024 15:22:49.173013926 CEST192.168.2.138.8.8.80x7d3cStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 13, 2024 15:20:06.807904005 CEST192.3.165.37192.168.2.130x9078No error (0)eighteen.pirate38.60.249.66A (IP address)IN (0x0001)false
                        Oct 13, 2024 15:22:49.179680109 CEST8.8.8.8192.168.2.130x6887No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                        Oct 13, 2024 15:22:49.179680109 CEST8.8.8.8192.168.2.130x6887No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):13:20:03
                        Start date (UTC):13/10/2024
                        Path:/tmp/na.elf
                        Arguments:/tmp/na.elf
                        File size:4139976 bytes
                        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                        Start time (UTC):13:20:04
                        Start date (UTC):13/10/2024
                        Path:/tmp/na.elf
                        Arguments:-
                        File size:4139976 bytes
                        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                        Start time (UTC):13:20:04
                        Start date (UTC):13/10/2024
                        Path:/tmp/na.elf
                        Arguments:-
                        File size:4139976 bytes
                        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                        Start time (UTC):13:20:04
                        Start date (UTC):13/10/2024
                        Path:/tmp/na.elf
                        Arguments:-
                        File size:4139976 bytes
                        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9