Edit tour
Linux
Analysis Report
arm6.elf
Overview
General Information
Sample name: | arm6.elf |
Analysis ID: | 1544382 |
MD5: | ad0b7aaee154290d61e61411997f0d7a |
SHA1: | 0db0ee7248e60c29240e07ff3e5a0abd031ab967 |
SHA256: | 1fa9ede1e804faeef868c072ef0d408e9ed6448e00bcf29b3c7dfa1b3da8c5ff |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1544382 |
Start date and time: | 2024-10-29 10:52:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | arm6.elf |
Detection: | MAL |
Classification: | mal48.linELF@0/0@2/0 |
- VT rate limit hit for: arm6.elf
Command: | /tmp/arm6.elf |
PID: | 5427 |
Exit Code: | 139 |
Exit Code Info: | SIGSEGV (11) Segmentation fault invalid memory reference |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 11 (Segmentation fault) - core dumped |
- system is lnxubuntu20
- cleanup
⊘No yara matches
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | String: | ||
Source: | String: | ||
Source: | String: |