Linux Analysis Report
spc.elf

Overview

General Information

Sample name: spc.elf
Analysis ID: 1542344
MD5: 4317cb5d0b025ff3ee98838c0cae11db
SHA1: 5be2069c4de16f4bb025e3d50a6b3b628840d3ef
SHA256: 0811c87ddbfef53685f2a7a5808eaa7ab59dc1f47c6f74f5bf34cc48ffa9918b
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 1
Range: 0 - 100
Whitelisted: false

Signatures

Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 33606
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 33606 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: clean1.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 6268) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.UkvbpLCbEf /tmp/tmp.sMwP72AK1y /tmp/tmp.A0rpXYDhiz Jump to behavior
Source: /usr/bin/dash (PID: 6269) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.UkvbpLCbEf /tmp/tmp.sMwP72AK1y /tmp/tmp.A0rpXYDhiz Jump to behavior
Source: /tmp/spc.elf (PID: 6231) Queries kernel information via 'uname': Jump to behavior
Source: spc.elf, 6231.1.00005586cf432000.00005586cf497000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sparc
Source: spc.elf, 6231.1.00005586cf432000.00005586cf497000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/sparc
Source: spc.elf, 6231.1.00007fffe7dec000.00007fffe7e0d000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sparc/tmp/spc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/spc.elf
Source: spc.elf, 6231.1.00007fffe7dec000.00007fffe7e0d000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sparc
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs