Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1532518
MD5:1f7870037d7fb8abfdd22416a26a1bbb
SHA1:9c5c51743e3859aee2f65c0b4271597512e2f5a4
SHA256:dfbbbef4b05eb83c777789126e96e6ed02a2bd1627a9ee0a32d2abb0da18c4bb
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Deletes system log files
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532518
Start date and time:2024-10-13 15:28:02 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 11s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal60.troj.evad.linELF@0/0@3/0
Command:/tmp/na.elf
PID:5514
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB lEarNs nOthinG xd
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5514, Parent: 5432, MD5: 7dc1c0e23cd5e102bb12e5c29403410e) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5516, Parent: 5514)
    • na.elf New Fork (PID: 5517, Parent: 5514)
    • na.elf New Fork (PID: 5521, Parent: 5514)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfReversingLabs: Detection: 18%
Source: na.elfString: ash|login|wget|curl|tftp|ntpdate
Source: na.elfString: /proc//exe|ash|login|wget|curl|tftp|ntpdate/fd/socket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/

Networking

barindex
Source: global trafficTCP traffic: 38.60.249.66 ports 3,4,6,7,9,49376
Source: global trafficTCP traffic: 192.168.2.14:57444 -> 38.60.249.66:49376
Source: /tmp/na.elf (PID: 5514)Socket: 127.0.0.1:1234Jump to behavior
Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownUDP traffic detected without corresponding DNS query: 130.61.64.122
Source: global trafficDNS traffic detected: DNS query: nineteen.libre
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal60.troj.evad.linELF@0/0@3/0

Data Obfuscation

barindex
Source: /tmp/na.elf (PID: 5517)File: /etc/configJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /root/.cacheJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /root/.sshJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /root/.configJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /root/.localJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /tmp/.X11-unixJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /tmp/.Test-unixJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /tmp/.font-unixJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /tmp/.ICE-unixJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /tmp/.XIM-unixJump to behavior
Source: /tmp/na.elf (PID: 5517)Directory: /etc/.javaJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5517)Log files deleted: /var/log/kern.logJump to behavior
Source: /tmp/na.elf (PID: 5514)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5514.1.00005598cafb0000.00005598cb039000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
Source: na.elf, 5514.1.00005598cafb0000.00005598cb039000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/sparc
Source: na.elf, 5514.1.00007ffd5a80a000.00007ffd5a82b000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sparc/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5514.1.00007ffd5a80a000.00007ffd5a82b000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Indicator Removal
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
na.elf18%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
nineteen.libre
38.60.249.66
truetrue
    unknown
    daisy.ubuntu.com
    162.213.35.25
    truefalseunknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    38.60.249.66
    nineteen.libreUnited States
    174COGENT-174UStrue
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26exCmhB0ruY.elfGet hashmaliciousUnknownBrowse
      bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
        bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
          na.elfGet hashmaliciousUnknownBrowse
            na.elfGet hashmaliciousUnknownBrowse
              na.elfGet hashmaliciousMiraiBrowse
                bash.elfGet hashmaliciousGafgyt, MiraiBrowse
                  na.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousUnknownBrowse
                      na.elfGet hashmaliciousUnknownBrowse
                        38.60.249.66na.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousUnknownBrowse
                              na.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousUnknownBrowse
                                  na.elfGet hashmaliciousUnknownBrowse
                                    na.elfGet hashmaliciousUnknownBrowse
                                      na.elfGet hashmaliciousUnknownBrowse
                                        GfPpov52Oc.elfGet hashmaliciousUnknownBrowse
                                          na.elfGet hashmaliciousUnknownBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            nineteen.librena.elfGet hashmaliciousMiraiBrowse
                                            • 38.60.249.66
                                            na.elfGet hashmaliciousMiraiBrowse
                                            • 38.60.249.66
                                            GfPpov52Oc.elfGet hashmaliciousUnknownBrowse
                                            • 38.60.249.66
                                            daisy.ubuntu.comna.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            arm5.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            arm6.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 162.213.35.24
                                            debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 162.213.35.25
                                            0h7AeM6QgB.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            na.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CANONICAL-ASGBna.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            JUh7kxiILb.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            na.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            na.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            SecuriteInfo.com.ELF.Mirai-ASX.1307.11743.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            SecuriteInfo.com.ELF.Mirai-ASX.31818.3935.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            Rj2IVGj6JJ.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            COGENT-174USna.elfGet hashmaliciousUnknownBrowse
                                            • 38.60.249.66
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 38.60.249.66
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 38.60.249.66
                                            debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 204.243.128.148
                                            SecuriteInfo.com.Win32.TrojanX-gen.16449.26967.exeGet hashmaliciousUnknownBrowse
                                            • 149.104.74.87
                                            SecuriteInfo.com.Win32.TrojanX-gen.16449.26967.exeGet hashmaliciousUnknownBrowse
                                            • 38.54.26.75
                                            m0mg1WH7Su.elfGet hashmaliciousMiraiBrowse
                                            • 38.14.172.49
                                            PeleHfdpzX.elfGet hashmaliciousMiraiBrowse
                                            • 38.139.235.111
                                            ULRmk7oYR7.elfGet hashmaliciousMiraiBrowse
                                            • 149.110.96.196
                                            na.elfGet hashmaliciousMiraiBrowse
                                            • 38.45.244.222
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                                            Entropy (8bit):5.914529698741412
                                            TrID:
                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                            File name:na.elf
                                            File size:60'984 bytes
                                            MD5:1f7870037d7fb8abfdd22416a26a1bbb
                                            SHA1:9c5c51743e3859aee2f65c0b4271597512e2f5a4
                                            SHA256:dfbbbef4b05eb83c777789126e96e6ed02a2bd1627a9ee0a32d2abb0da18c4bb
                                            SHA512:54baabfc43c873019c1c22c9b9ce1fee5b258a4468c206cf55b5da08565c3358fadea53430fa45acb272183d2e7c94c3f402cc9bb04591afc3a45be0e3328acf
                                            SSDEEP:1536:+q5U31FrnDRS2HWbyIWLQfzeJez6l6Tta4AnfS2TnO:+qmwMJ+ztKnqt
                                            TLSH:18532925BA762D2BC8D4997A21F74765F2F9134A14E8CA1E3D720E4EFF2064026137F8
                                            File Content Preview:.ELF...........................4.........4. ...(.......................x...x...............|...|...|......Ed........dt.Q................................@..(....@.4.................#.....`h..`.....!.....!...@.....".........`......$!...!...@...........`....

                                            ELF header

                                            Class:ELF32
                                            Data:2's complement, big endian
                                            Version:1 (current)
                                            Machine:Sparc
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - System V
                                            ABI Version:0
                                            Entry Point Address:0x101a4
                                            Flags:0x0
                                            ELF Header Size:52
                                            Program Header Offset:52
                                            Program Header Size:32
                                            Number of Program Headers:3
                                            Section Header Offset:60584
                                            Section Header Size:40
                                            Number of Section Headers:10
                                            Header String Table Index:9
                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                            NULL0x00x00x00x00x0000
                                            .initPROGBITS0x100940x940x1c0x00x6AX004
                                            .textPROGBITS0x100b00xb00xd2cc0x00x6AX004
                                            .finiPROGBITS0x1d37c0xd37c0x140x00x6AX004
                                            .rodataPROGBITS0x1d3900xd3900x15e80x00x2A008
                                            .ctorsPROGBITS0x2e97c0xe97c0x80x00x3WA004
                                            .dtorsPROGBITS0x2e9840xe9840x80x00x3WA004
                                            .dataPROGBITS0x2e9900xe9900x2d80x00x3WA008
                                            .bssNOBITS0x2ec680xec680x42780x00x3WA008
                                            .shstrtabSTRTAB0x00xec680x3e0x00x0001
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x100000x100000xe9780xe9785.93640x5R E0x10000.init .text .fini .rodata
                                            LOAD0xe97c0x2e97c0x2e97c0x2ec0x45643.74640x6RW 0x10000.ctors .dtors .data .bss
                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 13, 2024 15:28:57.741790056 CEST5744449376192.168.2.1438.60.249.66
                                            Oct 13, 2024 15:28:57.749373913 CEST493765744438.60.249.66192.168.2.14
                                            Oct 13, 2024 15:28:57.749438047 CEST5744449376192.168.2.1438.60.249.66
                                            Oct 13, 2024 15:28:57.761291981 CEST5744449376192.168.2.1438.60.249.66
                                            Oct 13, 2024 15:28:57.768228054 CEST493765744438.60.249.66192.168.2.14
                                            Oct 13, 2024 15:29:05.491880894 CEST46540443192.168.2.14185.125.190.26
                                            Oct 13, 2024 15:29:12.775716066 CEST5744449376192.168.2.1438.60.249.66
                                            Oct 13, 2024 15:29:12.780895948 CEST493765744438.60.249.66192.168.2.14
                                            Oct 13, 2024 15:29:16.585768938 CEST493765744438.60.249.66192.168.2.14
                                            Oct 13, 2024 15:29:16.585836887 CEST5744449376192.168.2.1438.60.249.66
                                            Oct 13, 2024 15:29:37.234635115 CEST46540443192.168.2.14185.125.190.26
                                            Oct 13, 2024 15:30:22.521312952 CEST493765744438.60.249.66192.168.2.14
                                            Oct 13, 2024 15:30:22.521589994 CEST5744449376192.168.2.1438.60.249.66
                                            Oct 13, 2024 15:30:52.543083906 CEST5744449376192.168.2.1438.60.249.66
                                            Oct 13, 2024 15:30:52.549124956 CEST493765744438.60.249.66192.168.2.14
                                            Oct 13, 2024 15:30:57.537925959 CEST493765744438.60.249.66192.168.2.14
                                            Oct 13, 2024 15:30:57.538439989 CEST5744449376192.168.2.1438.60.249.66
                                            Oct 13, 2024 15:31:42.519289017 CEST493765744438.60.249.66192.168.2.14
                                            Oct 13, 2024 15:31:42.519407034 CEST5744449376192.168.2.1438.60.249.66
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 13, 2024 15:28:57.721088886 CEST5362253192.168.2.14130.61.64.122
                                            Oct 13, 2024 15:28:57.728202105 CEST5353622130.61.64.122192.168.2.14
                                            Oct 13, 2024 15:31:41.857705116 CEST4132253192.168.2.148.8.8.8
                                            Oct 13, 2024 15:31:41.857793093 CEST5676053192.168.2.148.8.8.8
                                            Oct 13, 2024 15:31:41.864532948 CEST53567608.8.8.8192.168.2.14
                                            Oct 13, 2024 15:31:41.864557981 CEST53413228.8.8.8192.168.2.14
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Oct 13, 2024 15:28:57.721088886 CEST192.168.2.14130.61.64.1220x905dStandard query (0)nineteen.libreA (IP address)IN (0x0001)false
                                            Oct 13, 2024 15:31:41.857705116 CEST192.168.2.148.8.8.80xa091Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                            Oct 13, 2024 15:31:41.857793093 CEST192.168.2.148.8.8.80xdeb5Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Oct 13, 2024 15:28:57.728202105 CEST130.61.64.122192.168.2.140x905dNo error (0)nineteen.libre38.60.249.66A (IP address)IN (0x0001)false
                                            Oct 13, 2024 15:31:41.864557981 CEST8.8.8.8192.168.2.140xa091No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                            Oct 13, 2024 15:31:41.864557981 CEST8.8.8.8192.168.2.140xa091No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):13:28:56
                                            Start date (UTC):13/10/2024
                                            Path:/tmp/na.elf
                                            Arguments:/tmp/na.elf
                                            File size:4379400 bytes
                                            MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                            Start time (UTC):13:28:56
                                            Start date (UTC):13/10/2024
                                            Path:/tmp/na.elf
                                            Arguments:-
                                            File size:4379400 bytes
                                            MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                            Start time (UTC):13:28:56
                                            Start date (UTC):13/10/2024
                                            Path:/tmp/na.elf
                                            Arguments:-
                                            File size:4379400 bytes
                                            MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                            Start time (UTC):13:28:56
                                            Start date (UTC):13/10/2024
                                            Path:/tmp/na.elf
                                            Arguments:-
                                            File size:4379400 bytes
                                            MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e