Edit tour
Linux
Analysis Report
linux_386.elf
Overview
General Information
Sample name: | linux_386.elf |
Analysis ID: | 1543426 |
MD5: | 4b53bd2b79fc8f18d1a5e591358bcfb9 |
SHA1: | 4cde3dce676fb3a040472458c807b945d8ffefd8 |
SHA256: | 30523d9f0e7898f89538e2babd0e305b4e25b06521418e299e4e983c8597b558 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Chaos
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Chaos
Drops files in suspicious directories
Machine Learning detection for sample
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using cron
Sample tries to set files in /etc globally writable
Uses known network protocols on non-standard ports
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "kill" or "pkill" command typically used to terminate processes
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads CPU information from /sys indicative of miner or evasive malware
Reads the 'hosts' file potentially containing internal network hosts
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Sleeps for long times indicative of sandbox evasion
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension
Writes shell script files to disk
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1543426 |
Start date and time: | 2024-10-27 20:37:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | linux_386.elf |
Detection: | MAL |
Classification: | mal80.spre.troj.evad.linELF@0/17@2/0 |
- Report size exceeded maximum capacity and may have missing behavior information.
- VT rate limit hit for: linux_386.elf
Command: | /tmp/linux_386.elf |
PID: | 6238 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: |
- system is lnxubuntu20
- linux_386.elf New Fork (PID: 6243, Parent: 6238)
- linux_386.elf New Fork (PID: 6244, Parent: 6238)
- service New Fork (PID: 6254, Parent: 6244)
- service New Fork (PID: 6262, Parent: 6244)
- service New Fork (PID: 6264, Parent: 6244)
- linux_386.elf New Fork (PID: 6245, Parent: 6238)
- linux_386.elf New Fork (PID: 6261, Parent: 6245)
- update-rc.d New Fork (PID: 6265, Parent: 6261)
- linux_386.elf New Fork (PID: 6284, Parent: 6245)
- bash New Fork (PID: 6285, Parent: 6284)
- bash New Fork (PID: 6299, Parent: 6284)
- bash New Fork (PID: 6303, Parent: 6284)
- bash New Fork (PID: 6354, Parent: 6284)
- linux_386.elf New Fork (PID: 6373, Parent: 6245)
- bash New Fork (PID: 6374, Parent: 6373)
- bash New Fork (PID: 6375, Parent: 6373)
- bash New Fork (PID: 6376, Parent: 6373)
- linux_386.elf New Fork (PID: 6399, Parent: 6245)
- linux_386.elf New Fork (PID: 6443, Parent: 6245)
- linux_386.elf New Fork (PID: 6444, Parent: 6245)
- linux_386.elf New Fork (PID: 6466, Parent: 6245)
- service New Fork (PID: 6467, Parent: 6466)
- service New Fork (PID: 6468, Parent: 6466)
- service New Fork (PID: 6469, Parent: 6466)
- linux_386.elf New Fork (PID: 6592, Parent: 6245)
- systemd New Fork (PID: 6270, Parent: 6269)
- systemd New Fork (PID: 6297, Parent: 6296)
- systemd New Fork (PID: 6301, Parent: 6300)
- systemd New Fork (PID: 6305, Parent: 1)
- System.img.config New Fork (PID: 6317, Parent: 6305)
- System.img.config New Fork (PID: 6346, Parent: 6305)
- sh New Fork (PID: 6349, Parent: 6346)
- 32678 New Fork (PID: 6362, Parent: 6349)
- 32678 New Fork (PID: 6710, Parent: 6349)
- id.services.conf New Fork (PID: 6714, Parent: 6710)
- id.services.conf New Fork (PID: 6715, Parent: 6710)
- id.services.conf New Fork (PID: 6716, Parent: 6710)
- service New Fork (PID: 6723, Parent: 6716)
- service New Fork (PID: 6728, Parent: 6716)
- service New Fork (PID: 6729, Parent: 6716)
- id.services.conf New Fork (PID: 6718, Parent: 6710)
- System.img.config New Fork (PID: 6347, Parent: 6305)
- service New Fork (PID: 6358, Parent: 6347)
- service New Fork (PID: 6363, Parent: 6347)
- service New Fork (PID: 6364, Parent: 6347)
- System.img.config New Fork (PID: 6348, Parent: 6305)
- sshd New Fork (PID: 6368, Parent: 936)
- sshd New Fork (PID: 6372, Parent: 936)
- sshd New Fork (PID: 6377, Parent: 6372)
- udisksd New Fork (PID: 6456, Parent: 799)
- sshd New Fork (PID: 6543, Parent: 936)
- sshd New Fork (PID: 6551, Parent: 6543)
- systemd New Fork (PID: 6582, Parent: 1)
- systemd New Fork (PID: 6682, Parent: 1)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Chaos | Multi-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Reads CPU info from /sys: | ||
Source: | Reads CPU info from /sys: |
Networking |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | Reads hosts file: | Jump to behavior |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |