Linux Analysis Report
x.rar.elf

Overview

General Information

Sample name: x.rar.elf
Analysis ID: 1546386
MD5: b2fe01244a17f9cc77840e52cf249f08
SHA1: f648b6501cdba946dbf3cc93a714a0051ef22f99
SHA256: 5ff891c9c6c342fbe6e308f688b71dc289eb7ececf40f73364e2792a714913c6
Tags: elfuser-abuse_ch
Infos:

Detection

Xmrig
Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Found strings related to Crypto-Mining
Machine Learning detection for sample
Executes the "rm" command used to delete files or directories
Yara signature match

Classification

AV Detection

barindex
Source: x.rar.elf ReversingLabs: Detection: 31%
Source: x.rar.elf Joe Sandbox ML: detected

Bitcoin Miner

barindex
Source: Yara match File source: x.rar.elf, type: SAMPLE
Source: x.rar.elf String found in binary or memory: stratum+ssl://randomx.xmrig.com:443
Source: x.rar.elf String found in binary or memory: cryptonight/0
Source: x.rar.elf String found in binary or memory: -o, --url=URL URL of mining server
Source: x.rar.elf String found in binary or memory: stratum+tcp://
Source: x.rar.elf String found in binary or memory: Usage: xmrig [OPTIONS]
Source: x.rar.elf String found in binary or memory: XMRig 6.18.1
Source: unknown HTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.23:33606 version: TLS 1.2
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: x.rar.elf String found in binary or memory: https://xmrig.com/benchmark/%s
Source: x.rar.elf String found in binary or memory: https://xmrig.com/docs/algorithms
Source: x.rar.elf String found in binary or memory: https://xmrig.com/wizard
Source: x.rar.elf String found in binary or memory: https://xmrig.com/wizard%s
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 33606
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 33606 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown HTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.23:33606 version: TLS 1.2

System Summary

barindex
Source: x.rar.elf, type: SAMPLE Matched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
Source: x.rar.elf, type: SAMPLE Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
Source: x.rar.elf, type: SAMPLE Matched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
Source: x.rar.elf, type: SAMPLE Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
Source: classification engine Classification label: mal72.mine.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 6259) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.dAWMy7umgP /tmp/tmp.AJJQBzrGT2 /tmp/tmp.ySOq9iUnPf Jump to behavior
Source: /usr/bin/dash (PID: 6268) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.dAWMy7umgP /tmp/tmp.AJJQBzrGT2 /tmp/tmp.ySOq9iUnPf Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs