Linux Analysis Report
kkkarm7.elf

Overview

General Information

Sample name: kkkarm7.elf
Analysis ID: 1542899
MD5: 7e9acb296052d0d9bcd9dc3d2cee07c0
SHA1: b82940799726c17e512eb03331a8d10e96cd9a44
SHA256: 3f7216eacdfe93ed55b52920a5b4e7b983d02503f7bd69196f54a8c52ba8fc02
Tags: elfkkkMiraiuser-NDA0E
Infos:

Detection

Score: 60
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains symbols with names commonly found in malware
Detected TCP or UDP traffic on non-standard ports
Sample and/or dropped files contains symbols with suspicious names
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: kkkarm7.elf Avira: detected
Source: kkkarm7.elf ReversingLabs: Detection: 73%
Source: global traffic TCP traffic: 192.168.2.14:56436 -> 5.59.249.232:1337
Source: global traffic TCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
Source: unknown TCP traffic detected without corresponding DNS query: 5.59.249.232
Source: unknown TCP traffic detected without corresponding DNS query: 5.59.249.232
Source: unknown TCP traffic detected without corresponding DNS query: 100.151.38.78
Source: unknown TCP traffic detected without corresponding DNS query: 212.246.46.244
Source: unknown TCP traffic detected without corresponding DNS query: 184.216.168.78
Source: unknown TCP traffic detected without corresponding DNS query: 207.101.169.177
Source: unknown TCP traffic detected without corresponding DNS query: 144.29.173.77
Source: unknown TCP traffic detected without corresponding DNS query: 87.153.127.251
Source: unknown TCP traffic detected without corresponding DNS query: 94.42.183.237
Source: unknown TCP traffic detected without corresponding DNS query: 194.162.48.248
Source: unknown TCP traffic detected without corresponding DNS query: 149.46.47.32
Source: unknown TCP traffic detected without corresponding DNS query: 153.47.49.176
Source: unknown TCP traffic detected without corresponding DNS query: 47.164.83.228
Source: unknown TCP traffic detected without corresponding DNS query: 43.116.100.8
Source: unknown TCP traffic detected without corresponding DNS query: 183.203.48.95
Source: unknown TCP traffic detected without corresponding DNS query: 96.202.58.1
Source: unknown TCP traffic detected without corresponding DNS query: 139.29.180.55
Source: unknown TCP traffic detected without corresponding DNS query: 156.134.176.157
Source: unknown TCP traffic detected without corresponding DNS query: 198.35.31.184
Source: unknown TCP traffic detected without corresponding DNS query: 188.238.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 123.165.173.154
Source: unknown TCP traffic detected without corresponding DNS query: 144.49.203.72
Source: unknown TCP traffic detected without corresponding DNS query: 68.47.31.113
Source: unknown TCP traffic detected without corresponding DNS query: 246.80.113.9
Source: unknown TCP traffic detected without corresponding DNS query: 97.136.162.248
Source: unknown TCP traffic detected without corresponding DNS query: 135.218.11.109
Source: unknown TCP traffic detected without corresponding DNS query: 23.235.225.233
Source: unknown TCP traffic detected without corresponding DNS query: 27.198.222.118
Source: unknown TCP traffic detected without corresponding DNS query: 124.7.89.100
Source: unknown TCP traffic detected without corresponding DNS query: 119.161.187.221
Source: unknown TCP traffic detected without corresponding DNS query: 179.203.26.22
Source: unknown TCP traffic detected without corresponding DNS query: 142.15.146.242
Source: unknown TCP traffic detected without corresponding DNS query: 213.143.131.228
Source: unknown TCP traffic detected without corresponding DNS query: 188.59.185.59
Source: unknown TCP traffic detected without corresponding DNS query: 211.47.69.195
Source: unknown TCP traffic detected without corresponding DNS query: 191.73.25.197
Source: unknown TCP traffic detected without corresponding DNS query: 34.240.59.84
Source: unknown TCP traffic detected without corresponding DNS query: 40.122.223.105
Source: unknown TCP traffic detected without corresponding DNS query: 147.3.16.105
Source: unknown TCP traffic detected without corresponding DNS query: 92.177.189.234
Source: unknown TCP traffic detected without corresponding DNS query: 136.82.51.253
Source: unknown TCP traffic detected without corresponding DNS query: 181.170.38.19
Source: unknown TCP traffic detected without corresponding DNS query: 162.19.218.158
Source: unknown TCP traffic detected without corresponding DNS query: 84.135.169.252
Source: unknown TCP traffic detected without corresponding DNS query: 38.93.70.57
Source: unknown TCP traffic detected without corresponding DNS query: 73.11.151.28
Source: unknown TCP traffic detected without corresponding DNS query: 244.91.200.24
Source: unknown TCP traffic detected without corresponding DNS query: 165.255.73.181
Source: unknown TCP traffic detected without corresponding DNS query: 12.82.33.112
Source: unknown TCP traffic detected without corresponding DNS query: 139.164.193.152
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknown Network traffic detected: HTTP traffic on port 46540 -> 443

System Summary

barindex
Source: ELF static info symbol of initial sample Name: attack.c
Source: ELF static info symbol of initial sample Name: attack_get_opt_int
Source: ELF static info symbol of initial sample Name: attack_get_opt_ip
Source: ELF static info symbol of initial sample Name: attack_handshake
Source: ELF static info symbol of initial sample Name: attack_init
Source: ELF static info symbol of initial sample Name: attack_method.c
Source: ELF static info symbol of initial sample Name: attack_method_brainfuck
Source: ELF static info symbol of initial sample Name: attack_method_greip
Source: ELF static info symbol of initial sample Name: attack_method_onepacket
Source: ELF static info symbol of initial sample Name: attack_method_std
Source: kkkarm7.elf ELF static info symbol of initial sample: __gnu_unwind_execute
Source: kkkarm7.elf ELF static info symbol of initial sample: scanner.c
Source: kkkarm7.elf ELF static info symbol of initial sample: scanner_init
Source: kkkarm7.elf ELF static info symbol of initial sample: scanner_pid
Source: kkkarm7.elf ELF static info symbol of initial sample: scanner_rawpkt
Source: classification engine Classification label: mal60.linELF@0/0@2/0
Source: /tmp/kkkarm7.elf (PID: 5481) Queries kernel information via 'uname': Jump to behavior
Source: kkkarm7.elf, 5481.1.000056399b1ac000.000056399b2fc000.rw-.sdmp, kkkarm7.elf, 5484.1.000056399b1ac000.000056399b2da000.rw-.sdmp, kkkarm7.elf, 5488.1.000056399b1ac000.000056399b2da000.rw-.sdmp, kkkarm7.elf, 5490.1.000056399b1ac000.000056399b2da000.rw-.sdmp Binary or memory string: 9V!/etc/qemu-binfmt/arm
Source: kkkarm7.elf, 5481.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp, kkkarm7.elf, 5484.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp, kkkarm7.elf, 5488.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp, kkkarm7.elf, 5490.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/kkkarm7.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/kkkarm7.elf
Source: kkkarm7.elf, 5481.1.000056399b1ac000.000056399b2fc000.rw-.sdmp, kkkarm7.elf, 5484.1.000056399b1ac000.000056399b2da000.rw-.sdmp, kkkarm7.elf, 5488.1.000056399b1ac000.000056399b2da000.rw-.sdmp, kkkarm7.elf, 5490.1.000056399b1ac000.000056399b2da000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: kkkarm7.elf, 5481.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp, kkkarm7.elf, 5484.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp, kkkarm7.elf, 5488.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp, kkkarm7.elf, 5490.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: kkkarm7.elf, 5488.1.00007ffc4685b000.00007ffc4687c000.rw-.sdmp Binary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs