Linux Analysis Report
3qI83sDZlt.elf

Overview

General Information

Sample name: 3qI83sDZlt.elf
renamed because original name is a hash value
Original sample name: 3cd0d2b3c9359e95d6522fb18508ec5f.elf
Analysis ID: 1532763
MD5: 3cd0d2b3c9359e95d6522fb18508ec5f
SHA1: f28ee5961f157611852e1f58f199256a1ac08e97
SHA256: e094fa55e07372a8937b51387f98b3a995980d4727a78480203ed31f783d1cf4
Tags: 32armelfmirai
Infos:

Detection

Score: 60
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

AV Detection

barindex
Source: 3qI83sDZlt.elf ReversingLabs: Detection: 36%
Source: global traffic TCP traffic: 192.168.2.13:37462 -> 45.131.65.138:3778
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknown TCP traffic detected without corresponding DNS query: 45.131.65.138
Source: 3qI83sDZlt.elf String found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: 5438.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5434.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5444.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5436.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5434, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5436, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5438, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5444, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: LOAD without section mappings Program segment: 0x8000
Source: 5438.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5434.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5444.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5436.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5434, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5436, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5438, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5444, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engine Classification label: mal60.evad.linELF@0/0@0/0

Data Obfuscation

barindex
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/5265/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/230/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/5381/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/110/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/231/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/111/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/232/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/112/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/233/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/113/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/234/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/114/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/235/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/115/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/236/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/116/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/237/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/117/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/238/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/118/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/239/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/119/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/914/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/10/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/917/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/3758/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/11/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/12/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/13/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/14/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/15/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/16/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/17/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/18/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/19/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/240/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/3095/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/120/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/241/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/121/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/242/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/1/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/122/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/243/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/2/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/123/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/244/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/3/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/124/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/245/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/1588/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/125/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/4/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/246/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/126/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/5/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/247/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/127/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/6/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/248/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/128/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/7/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/249/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/129/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/8/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/800/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/9/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/1906/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/3642/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/802/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/803/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/20/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/21/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/22/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/23/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/24/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/25/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/26/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/27/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/28/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/29/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/3420/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/1482/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/490/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/1480/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/250/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/371/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/130/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/251/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/131/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/252/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/132/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/253/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/254/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/1238/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/134/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/255/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/256/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/257/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/378/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/3413/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/258/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/259/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/1475/status Jump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434) File opened: /proc/936/status Jump to behavior
Source: 3qI83sDZlt.elf Submission file: segment LOAD with 7.9742 entropy (max. 8.0)
Source: /tmp/3qI83sDZlt.elf (PID: 5434) Queries kernel information via 'uname': Jump to behavior
Source: 3qI83sDZlt.elf, 5434.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5436.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5438.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5444.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/3qI83sDZlt.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/3qI83sDZlt.elf
Source: 3qI83sDZlt.elf, 5434.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5436.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5438.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5444.1.000055e7d7594000.000055e7d7782000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: 3qI83sDZlt.elf, 5434.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5436.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5438.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5444.1.000055e7d7594000.000055e7d7782000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: 3qI83sDZlt.elf, 5434.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5436.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5438.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5444.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs