Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
linux_mips64.elf

Overview

General Information

Sample name:linux_mips64.elf
Analysis ID:1545808
MD5:fee0e4359d03f80ee629b5e0aec930d4
SHA1:c940b354f66ef4e516c89b52e8757785b285ee29
SHA256:8a8c9288eefd3d45b533897760196dbcd86d1609796242bbfdfed5ef9720ceac
Tags:elfuser-abuse_ch
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false

Signatures

Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1545808
Start date and time:2024-10-31 03:17:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 24s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:linux_mips64.elf
Detection:CLEAN
Classification:clean1.linELF@0/0@0/0
Command:/tmp/linux_mips64.elf
PID:6211
Exit Code:135
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • linux_mips64.elf (PID: 6211, Parent: 6126, MD5: 801a06b4e0ed2dca89cbfa1f900a483d) Arguments: /tmp/linux_mips64.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: clean1.linELF@0/0@0/0
Source: /tmp/linux_mips64.elf (PID: 6211)Queries kernel information via 'uname': Jump to behavior
Source: linux_mips64.elf, 6211.1.00007fff3e9d9000.00007fff3e9fa000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips64
Source: linux_mips64.elf, 6211.1.00005587f15f0000.00005587f1676000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mips641RelativeDistinguishedName
Source: linux_mips64.elf, 6211.1.00007fff3e9d9000.00007fff3e9fa000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips64/tmp/linux_mips64.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/linux_mips64.elf
Source: linux_mips64.elf, 6211.1.00005587f15f0000.00005587f1676000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips64
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
91.189.91.43la.bot.sh4.elfGet hashmaliciousUnknownBrowse
    la.bot.arm.elfGet hashmaliciousUnknownBrowse
      la.bot.arm6.elfGet hashmaliciousUnknownBrowse
        la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
          la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
            la.bot.arm5.elfGet hashmaliciousUnknownBrowse
              tftp.elfGet hashmaliciousUnknownBrowse
                la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                  la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                    la.bot.mips.elfGet hashmaliciousUnknownBrowse
                      91.189.91.42la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                        la.bot.arm.elfGet hashmaliciousUnknownBrowse
                          la.bot.arm6.elfGet hashmaliciousUnknownBrowse
                            la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                              la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                  tftp.elfGet hashmaliciousUnknownBrowse
                                    la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                      la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                        la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CANONICAL-ASGBla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.arm6.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          tftp.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          CANONICAL-ASGBla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.arm6.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          tftp.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                          • 91.189.91.42
                                          INIT7CHla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          la.bot.arm6.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          tftp.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                          • 109.202.202.202
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:ELF 64-bit MSB executable, MIPS, MIPS-III version 1 (SYSV), statically linked, too large section header offset 4231488
                                          Entropy (8bit):5.138134897525879
                                          TrID:
                                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                          File name:linux_mips64.elf
                                          File size:2'771'585 bytes
                                          MD5:fee0e4359d03f80ee629b5e0aec930d4
                                          SHA1:c940b354f66ef4e516c89b52e8757785b285ee29
                                          SHA256:8a8c9288eefd3d45b533897760196dbcd86d1609796242bbfdfed5ef9720ceac
                                          SHA512:e0d2ebbc4dd9297910aeac16b7b14399803e1146caaa91348d6f8e773e607576a8308f4892215b76bd07914dcdfd5a8363eca437e34ec255adb174f2858436e7
                                          SSDEEP:24576:kYc8hbuA60SjA4JPr3+wSkmAUd4TJcTzSN5A+FJW1I9OBL4AB61jTw5UMb5Ud4CM:XralYj
                                          TLSH:9CD59462FF98AE2FE6A53035937AC13033D93A1581F078318A56D60D2F9E275981BDDC
                                          File Content Preview:.ELF...................................@........ ....@.8...@...................@.......@.......@...............................................................d.......d.............................................0.......0.......................1.......2.

                                          ELF header

                                          Class:ELF64
                                          Data:2's complement, big endian
                                          Version:1 (current)
                                          Machine:MIPS R3000
                                          Version Number:0x1
                                          Type:EXEC (Executable file)
                                          OS/ABI:UNIX - System V
                                          ABI Version:0
                                          Entry Point Address:0x90000
                                          Flags:0x20000004
                                          ELF Header Size:64
                                          Program Header Offset:64
                                          Program Header Size:56
                                          Number of Program Headers:7
                                          Section Header Offset:456
                                          Section Header Size:64
                                          Number of Section Headers:14
                                          Header String Table Index:3
                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                          NULL0x00x00x00x00x0000
                                          PROGBITS0x110000x10000x30dbf00x00x6AX008
                                          PROGBITS0x3200000x3100000xf91340x00x2A0032
                                          STRTAB0x00x4091400xa50x00x0001
                                          PROGBITS0x4192000x4092000x17c80x00x2A0032
                                          PROGBITS0x41a9e00x40a9e00x9480x00x2A0032
                                          PROGBITS0x41b3280x40b3280x00x00x2A001
                                          PROGBITS0x41b3400x40b3400x14bcb80x00x2A0032
                                          PROGBITS0x5700000x5600000xf00x00x3WA0016
                                          PROGBITS0x5701000x5601000x31e180x00x3WA0032
                                          PROGBITS0x5a1f200x591f200xfe800x00x3WA0032
                                          NOBITS0x5b1da00x5a1da00x301000x00x3WA0032
                                          NOBITS0x5e1ea00x5d1ea00xf5700x00x3WA0032
                                          NOTE0x10f9c0xf9c0x640x00x2A004
                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                          PHDR0x400x100400x100400x1880x1881.50300x4R 0x10000
                                          NOTE0xf9c0x10f9c0x10f9c0x640x645.31720x4R 0x4
                                          LOAD0x00x100000x100000x30ebf00x30ebf05.13810x5R E0x10000
                                          LOAD0x3100000x3200000x3200000x246ff80x246ff80.00000x4R 0x10000
                                          LOAD0x5600000x5700000x5700000x41da00x814100.00000x6RW 0x10000
                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                          LOOS+50415800x00x00x00x00x00.00000x2a00 0x8
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 31, 2024 03:17:45.364058018 CET43928443192.168.2.2391.189.91.42
                                          Oct 31, 2024 03:17:50.991082907 CET42836443192.168.2.2391.189.91.43
                                          Oct 31, 2024 03:17:52.526837111 CET4251680192.168.2.23109.202.202.202
                                          Oct 31, 2024 03:18:05.837057114 CET43928443192.168.2.2391.189.91.42
                                          Oct 31, 2024 03:18:18.123450994 CET42836443192.168.2.2391.189.91.43
                                          Oct 31, 2024 03:18:22.218736887 CET4251680192.168.2.23109.202.202.202
                                          Oct 31, 2024 03:18:46.791430950 CET43928443192.168.2.2391.189.91.42

                                          System Behavior

                                          Start time (UTC):02:17:43
                                          Start date (UTC):31/10/2024
                                          Path:/tmp/linux_mips64.elf
                                          Arguments:/tmp/linux_mips64.elf
                                          File size:5830456 bytes
                                          MD5 hash:801a06b4e0ed2dca89cbfa1f900a483d