Edit tour
Linux
Analysis Report
dlr.arm6.elf
Overview
General Information
Sample name: | dlr.arm6.elf |
Analysis ID: | 1542861 |
MD5: | b0fb587ae4404c9fd86eda2985d1a15b |
SHA1: | c32b89a1e2f4b741ba9c4cbd903faf5e2270a5f1 |
SHA256: | 994c64af68157c42c80142c4f12381995986600031ddaa5f2b4a6858b9529171 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Okiru
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Okiru
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
HTTP GET or POST without a user agent
Reads system version information
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1542861 |
Start date and time: | 2024-10-26 19:20:10 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 24s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | dlr.arm6.elf |
Detection: | MAL |
Classification: | mal64.troj.linELF@0/1@0/0 |
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: dlr.arm6.elf
Command: | /tmp/dlr.arm6.elf |
PID: | 5705 |
Exit Code: | 5 |
Exit Code Info: | |
Killed: | False |
Standard Output: | byte bro |
Standard Error: |
- system is lnxubuntu20
- systemd New Fork (PID: 5744, Parent: 1)
- snap-failure New Fork (PID: 5759, Parent: 5744)
- snap-failure New Fork (PID: 5760, Parent: 5744)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | String: |