Linux Analysis Report
linux_arm64.elf

Overview

General Information

Sample name: linux_arm64.elf
Analysis ID: 1543427
MD5: 8014c239074b291949ad02412c68dcaa
SHA1: 0f3ba8516e4e05659e02c3c79337598186eca9d4
SHA256: 6563fa59ed29306a47ea2b0aa67bedc77e1d25c8a911569a042a269775747c77
Tags: elfuser-abuse_ch
Infos:

Detection

Chaos
Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Chaos
Drops files in suspicious directories
Sample tries to set files in /etc globally writable
Uses known network protocols on non-standard ports
Writes identical ELF files to multiple locations
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "kill" or "pkill" command typically used to terminate processes
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads CPU information from /sys indicative of miner or evasive malware
Reads the 'hosts' file potentially containing internal network hosts
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Sleeps for long times indicative of sandbox evasion
Suricata IDS alerts with low severity for network traffic
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk
Writes shell script file to disk with an unusual file extension

Classification

AV Detection

barindex
Source: linux_arm64.elf ReversingLabs: Detection: 42%
Source: /tmp/linux_arm64.elf (PID: 6235) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6355) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6613) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior

Networking

barindex
Source: unknown Network traffic detected: HTTP traffic on port 808 -> 53972
Source: unknown Network traffic detected: HTTP traffic on port 53976 -> 808
Source: unknown Network traffic detected: HTTP traffic on port 808 -> 53976
Source: global traffic TCP traffic: 192.168.2.23:53972 -> 154.12.82.11:808
Source: /tmp/linux_arm64.elf (PID: 6235) Reads hosts file: /etc/hosts Jump to behavior
Source: Network traffic Suricata IDS: 2850023 - Severity 1 - ETPRO JA3 Hash - Possible Ligolo Server/Golang Binary Response : 154.12.82.11:7878 -> 192.168.2.23:52100
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.82.11
Source: global traffic HTTP traffic detected: GET /password.txt HTTP/1.1Host: 154.12.82.11:808User-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: http2: Transport conn %p received error from processing frame %v: %vhttp2: Transport received unsolicited DATA frame; closing connectionhttp: message cannot contain multiple Content-Length headers; got %qpadding bytes must all be zeros unless AllowIllegalWrites is enabledreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerhttp2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)tls: handshake message of length %d bytes exceeds maximum of %d bytestls: peer doesn't support the certificate custom signature algorithmsbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xgot %s for stream %d; expected CONTINUATION following %s for stream %dx509: PKCS#8 wrapping contained private key with unknown algorithm: %vx509: certificate relies on legacy Common Name field, use SANs insteadMozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)Sogou Pic Spider/3.0(+http://www.sogou.com/docs/help/webmasters.htm#07)Sogou web spider/4.0(+http://www.sogou.com/docs/help/webmasters.htm#07)dynamic table size update MUST occur at the beginning of a header blockssh: no common algorithm for %s; client offered: %v, server offered: %vtls: peer doesn't support any of the certificate's signature algorithmstoo many concurrent operations on a single file or socket (max 1048575)x509: issuer has name constraints but leaf doesn't have a SAN extensionMozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)tls: server's certificate contains an unsupported type of public key: %Ttls: received unexpected handshake message of type %T when waiting for %T91289437fa036b34da55d57af6192768c27bd433fa012169d626d934e0051b24dd67dd3cf49d7cc827bc012d259d7ac226e70829239d7ac226e7082968de60d520eb433722c07fd236f6crypto/elliptic: internal error: Unmarshal rejected a valid point encodingmalformed response from server: malformed non-numeric status pseudo headernet/http: server replied with more than declared Content-Length; truncatedtls: certificate RSA key size too small for supported signature algorithmsUnsolicited response received on idle HTTP channel starting with %q; err=%vtls: internal error: attempted to read record with pending application datatls: failed to send closeNotify alert (but connection was closed anyway): %wtls: server certificate contains incorrect key type for selected ciphersuite((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})(\.((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})){3}MapIter.Next called on an iterator that does not have an associated map Valuecrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled115792089210356248762697446949407573529996955224135760342422259061068512044369115792089210356248762697446949407573530086143415290314195533631308867097853951ssh: internal error: algorithmSignerWrapper invoked with non-default algorithmssh: unable to authenticate, attempted methods %v, no supported methods remainx509: signature check attempt
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: http: RoundTripper implementation (%T) returned a nil *Response with a nil errortls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificaterefusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxyx509: a root or intermediate certificate is not authorized to sign for this name: (possibly because of %q while trying to verify candidate authority certificate %q)Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)x509: issuer has name constraints but leaf contains unknown or unconstrained name: tls: downgrade attempt detected, possibly due to a MitM attack or a broken middleboxx509: signature algorithm specifies an %s public key, but have public key of type %Treflect.Value.Interface: cannot return value obtained from unexported field or methodx509: failed to parse private key (use ParseECPrivateKey instead for this key format)Mozilla/5.0 (compatible; YoudaoBot/1.0; http://www.youdao.com/help/webmaster/spider/;)reflect: New of type that may not be allocated in heap (possibly undefined cgo C type)x509: a root or intermediate certificate is not authorized for an extended key usage: fxfzUc6gtMGc/i26ld3KydGKy1k7QqyMMyxjbU1Rlk+F9LQxnaTeCHGHsDUpaBeOWDeY6l+2kHlB7EWTLcGwfg==whv+Kf1cEtOXzr+zuvmef2as0WfbUDm8l2LMWBMel10NDnbShg9CsMUt327VJhOTbXLoPYJVTKy8MBPCVwoT8A==x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%qapplication/xml,application/xhtml+xml,text/html;q=0.9, text/plain;q=0.8,image/png,*/*;q=0.5tls: handshake hash for a client certificate requested after discarding the handshake buffertls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKey3617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b1ce1d7e819d7a431d7c90ea0e5faa87ca22be8b05378eb1c71ef320ad746e1d3b628ba79b9859f741e082542a385502f25dbf55296c3a545e3872760ab7b3312fa7e23ee7e4988e056be3f82d19181d9c6efe8141120314088f5013875ac656398d8a2ed19d2a85c8edd3ec2aefhttp: RoundTripper implementation (%T) returned a *Response with content length %d but a nil BodyNoClientCertRequestClientCertRequireAnyClientCertVerifyClientCertIfGivenRequireAndVerifyClientCertcipher: the nonce can't have zero length, or the security of the key will be immediately compromised1.0.3<<RMS>> equals www.yahoo.com (Yahoo)
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)x509:
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: http://search.msn.com/msnbot.htm
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: http://www.baidu.com/search/spider.html)Mozilla/5.0
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: http://www.baidu.com/search/spider.html)http2:
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: http://www.youdao.com/help/webmaster/spider/;)reflect:
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: http://yandex.com/bots)http:
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: https://search.yahoo.com/search?p=illegal
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: https://www.baidu.com/s?wd=insufficient
Source: linux_arm64.elf, System.img.config.19.dr, id.services.conf.12.dr String found in binary or memory: https://www.so.com/s?q=index
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: /usr/bin/pkill (PID: 6355) SIGKILL sent: pid: 6234, result: successful Jump to behavior
Source: /usr/bin/pkill (PID: 6613) SIGKILL sent: pid: 6550, result: successful Jump to behavior
Source: classification engine Classification label: mal72.troj.evad.linELF@0/56@2/0
Source: ELF file section Submission: linux_arm64.elf
Source: ELF file section Dropped file: id.services.conf.12.dr
Source: ELF file section Dropped file: System.img.config.19.dr

Persistence and Installation Behavior

barindex
Source: /tmp/linux_arm64.elf (PID: 6221) File: /etc/id.services.conf (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6221) File: /etc/32678 (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6235) File with SHA-256 6563FA59ED29306A47EA2B0AA67BEDC77E1D25C8A911569A042A269775747C77 written: /boot/System.img.config Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 6221) File with SHA-256 6563FA59ED29306A47EA2B0AA67BEDC77E1D25C8A911569A042A269775747C77 written: /etc/id.services.conf Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 6235) File: /dev/.old Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6235) File: /dev/.img Jump to behavior
Source: /etc/id.services.conf (PID: 6629) File: /dev/.old Jump to behavior
Source: /etc/id.services.conf (PID: 6629) File: /dev/.img Jump to behavior
Source: /boot/System.img.config (PID: 6555) File: /dev/.old
Source: /boot/System.img.config (PID: 6555) File: /dev/.img
Source: /boot/System.img.config (PID: 6555) Empty hidden file: /dev/.old
Source: /boot/System.img.config (PID: 6555) Empty hidden file: /dev/.img
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6234/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6234/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6355/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6355/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6235/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6235/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1582/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1582/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/3088/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/3088/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/230/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/230/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/110/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/110/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/231/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/231/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/111/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/111/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/232/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/232/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1579/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1579/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/112/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/112/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/233/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/233/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1699/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1699/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/113/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/113/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/234/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/234/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1335/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1335/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1698/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1698/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/114/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/114/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/235/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/235/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1334/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1334/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1576/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1576/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/2302/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/2302/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/115/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/115/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/236/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/236/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/116/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/116/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/237/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/237/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/117/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/117/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/118/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/118/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/910/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/910/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6348/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6348/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/119/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/119/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6347/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/6347/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/912/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/912/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/10/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/10/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/2307/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/2307/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/11/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/11/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/918/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/918/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/12/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/12/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/13/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/13/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/14/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/14/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/15/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/15/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/16/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/16/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/17/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/17/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/18/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/18/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1594/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1594/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/120/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/120/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/121/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/121/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1349/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1349/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/1/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/122/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/122/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/243/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/243/cmdline Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/123/status Jump to behavior
Source: /usr/bin/pkill (PID: 6355) File opened: /proc/123/cmdline Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6226) Shell command executed: /bin/bash -c /etc/32678& Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6320) Shell command executed: /bin/bash -c "cd /boot;systemctl daemon-reload;systemctl enable linux.service;systemctl start linux.service;journalctl -xe --no-pager" Jump to behavior
Source: /boot/System.img.config (PID: 6355) Pkill executable: /usr/bin/pkill -> pkill -9 32678 Jump to behavior
Source: /etc/id.services.conf (PID: 6613) Pkill executable: /usr/bin/pkill -> pkill -9 32678 Jump to behavior
Source: /usr/sbin/service (PID: 6232) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service Jump to behavior
Source: /usr/sbin/service (PID: 6242) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target Jump to behavior
Source: /usr/sbin/service (PID: 6253) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket Jump to behavior
Source: /usr/sbin/update-rc.d (PID: 6268) Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reload Jump to behavior
Source: /bin/bash (PID: 6323) Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reload Jump to behavior
Source: /bin/bash (PID: 6341) Systemctl executable: /usr/bin/systemctl -> systemctl enable linux.service Jump to behavior
Source: /bin/bash (PID: 6347) Systemctl executable: /usr/bin/systemctl -> systemctl start linux.service Jump to behavior
Source: /usr/sbin/service (PID: 6621) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service Jump to behavior
Source: /usr/sbin/service (PID: 6640) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target Jump to behavior
Source: /usr/sbin/service (PID: 6647) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket Jump to behavior
Source: /usr/sbin/service (PID: 6548) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service Jump to behavior
Source: /usr/sbin/service (PID: 6566) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target Jump to behavior
Source: /usr/sbin/service (PID: 6576) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6221) File: /etc/id.services.conf (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6221) File: /etc/32678 (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6235) File: /boot/System.img.config (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6221) File written: /etc/id.services.conf Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 6235) File written: /boot/System.img.config Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 6221) Writes shell script file to disk with an unusual file extension: /etc/32678 Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 6235) Writes shell script file to disk with an unusual file extension: /etc/init.d/linux_kill Jump to dropped file
Source: /usr/sbin/service (PID: 6254) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p Jump to behavior
Source: /usr/sbin/service (PID: 6648) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p Jump to behavior
Source: /usr/sbin/service (PID: 6577) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/linux_arm64.elf (PID: 6235) File: /etc/init.d/linux_kill Jump to dropped file
Source: unknown Network traffic detected: HTTP traffic on port 808 -> 53972
Source: unknown Network traffic detected: HTTP traffic on port 53976 -> 808
Source: unknown Network traffic detected: HTTP traffic on port 808 -> 53976
Source: /etc/32678 (PID: 6239) Sleep executable: /usr/bin/sleep -> sleep 60 Jump to behavior
Source: /etc/32678 (PID: 6564) Sleep executable: /usr/bin/sleep -> sleep 60 Jump to behavior
Source: /etc/32678 (PID: 6638) Sleep executable: /usr/bin/sleep -> sleep 60 Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6235) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6355) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6613) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/sleep (PID: 6239) Sleeps longer then 60s: 60.0s Jump to behavior
Source: /usr/bin/sleep (PID: 6564) Sleeps longer then 60s: 60.0s Jump to behavior
Source: /usr/bin/sleep (PID: 6638) Sleeps longer then 60s: 60.0s Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6221) Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 6226) Queries kernel information via 'uname': Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 6235) Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 6320) Queries kernel information via 'uname': Jump to behavior
Source: /boot/System.img.config (PID: 6348) Queries kernel information via 'uname': Jump to behavior
Source: /etc/id.services.conf (PID: 6607) Queries kernel information via 'uname': Jump to behavior
Source: /etc/id.services.conf (PID: 6629) Queries kernel information via 'uname': Jump to behavior
Source: /boot/System.img.config (PID: 6555) Queries kernel information via 'uname':
Source: System.img.config, 6555.1.000055fd54683000.000055fd54bff000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/aarch64
Source: id.services.conf, 6629.1.00007ffc3cdce000.00007ffc3cdef000.rw-.sdmp Binary or memory string: Bx86_64/usr/bin/qemu-aarch64/etc/id.services.conf
Source: 32678, 6607.1.00007ffdf72ec000.00007ffdf730d000.rw-.sdmp, id.services.conf, 6607.1.00007ffdf72ec000.00007ffdf730d000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-aarch64/etc/id.services.confJOURNAL_STREAM=9:75215PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binINVOCATION_ID=4f9991526ab544b5958a0438d46ce107LANG=en_US.UTF-8PWD=//etc/id.services.conf
Source: systemd, 6348.1.000055b756e78000.000055b75740e000.rw-.sdmp, System.img.config, 6348.1.000055b756e78000.000055b75740e000.rw-.sdmp Binary or memory string: Urg.qemu.gdb.arm.sys.regs">@
Source: System.img.config, 6555.1.000055fd54683000.000055fd54bff000.rw-.sdmp Binary or memory string: U1/etc/qemu-binfmt/aarch64O
Source: id.services.conf, 6629.1.0000560380721000.0000560380c9d000.rw-.sdmp Binary or memory string: Vrg.qemu.gdb.arm.sys.regs">
Source: 32678, 6607.1.00005651e4440000.00005651e49d8000.rw-.sdmp, id.services.conf, 6607.1.00005651e4440000.00005651e49d8000.rw-.sdmp Binary or memory string: QV1/etc/qemu-binfmt/aarch64O
Source: System.img.config, 6555.1.000055fd54683000.000055fd54bff000.rw-.sdmp Binary or memory string: Urg.qemu.gdb.arm.sys.regs">
Source: systemd, 6348.1.00007fff57283000.00007fff572a4000.rw-.sdmp, System.img.config, 6348.1.00007fff57283000.00007fff572a4000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-aarch64/boot/System.img.configLANG=en_US.UTF-8PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binINVOCATION_ID=4f9991526ab544b5958a0438d46ce107JOURNAL_STREAM=9:75215/boot/System.img.config
Source: System.img.config, 6555.1.00007ffd0e5f9000.00007ffd0e61a000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-aarch64/boot/System.img.config
Source: System.img.config, 6555.1.000055fd54683000.000055fd54bff000.rw-.sdmp Binary or memory string: rg.qemu.gdb.arm.sys.regs">
Source: linux_arm64.elf, 6221.1.00007ffeb6b49000.00007ffeb6b6a000.rw-.sdmp Binary or memory string: N~x86_64/usr/bin/qemu-aarch64/tmp/linux_arm64.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/linux_arm64.elf
Source: 32678, 6607.1.00005651e4440000.00005651e49d8000.rw-.sdmp, id.services.conf, 6607.1.00005651e4440000.00005651e49d8000.rw-.sdmp Binary or memory string: QVrg.qemu.gdb.arm.sys.regs">
Source: System.img.config, 6555.1.00007ffd0e5f9000.00007ffd0e61a000.rw-.sdmp Binary or memory string: /usr/bin/qemu-aarch64
Source: id.services.conf, 6629.1.0000560380721000.0000560380c9d000.rw-.sdmp Binary or memory string: V1/etc/qemu-binfmt/aarch64O

Stealing of Sensitive Information

barindex
Source: Yara match File source: linux_arm64.elf, type: SAMPLE
Source: Yara match File source: /etc/id.services.conf, type: DROPPED
Source: Yara match File source: /boot/System.img.config, type: DROPPED

Remote Access Functionality

barindex
Source: Yara match File source: linux_arm64.elf, type: SAMPLE
Source: Yara match File source: /etc/id.services.conf, type: DROPPED
Source: Yara match File source: /boot/System.img.config, type: DROPPED
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs