Linux Analysis Report
linux_arm64.elf

Overview

General Information

Sample name: linux_arm64.elf
Analysis ID: 1562738
MD5: 287250a348dd465f040bc52319296693
SHA1: d79a34f42217d8b84c2078b748a6a3fad02b1a8c
SHA256: 869233c64937bb4d528e3d9c989f3c43eb97f45c0ad303d098fcfcea3afdbcd1
Tags: elfuser-abuse_ch
Infos:

Detection

Chaos
Score: 84
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Chaos
Connects to many ports of the same IP (likely port scanning)
Drops files in suspicious directories
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using cron
Sample tries to set files in /etc globally writable
Uses known network protocols on non-standard ports
Writes identical ELF files to multiple locations
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Detected TCP or UDP traffic on non-standard ports
Drops files with innocent-looking names
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "kill" or "pkill" command typically used to terminate processes
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads CPU information from /sys indicative of miner or evasive malware
Reads the 'hosts' file potentially containing internal network hosts
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Sleeps for long times indicative of sandbox evasion
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk
Writes shell script file to disk with an unusual file extension
Writes shell script files to disk

Classification

AV Detection

barindex
Source: linux_arm64.elf ReversingLabs: Detection: 42%
Source: /tmp/linux_arm64.elf (PID: 5568) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5644) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6076) Reads CPU info from /sys: /sys/devices/system/cpu/online

Networking

barindex
Source: global traffic TCP traffic: 103.135.101.78 ports 808,52462,2,4,5,6
Source: unknown Network traffic detected: HTTP traffic on port 47718 -> 808
Source: unknown Network traffic detected: HTTP traffic on port 808 -> 47718
Source: global traffic TCP traffic: 192.168.2.14:42430 -> 103.135.101.78:52462
Source: /tmp/linux_arm64.elf (PID: 5568) Reads hosts file: /etc/hosts Jump to behavior
Source: global traffic HTTP traffic detected: GET /password.txt HTTP/1.1Host: 103.135.101.78:808User-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: http2: Transport conn %p received error from processing frame %v: %vhttp2: Transport received unsolicited DATA frame; closing connectionhttp: message cannot contain multiple Content-Length headers; got %qpadding bytes must all be zeros unless AllowIllegalWrites is enabledreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerhttp2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)tls: handshake message of length %d bytes exceeds maximum of %d bytestls: peer doesn't support the certificate custom signature algorithmsbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xgot %s for stream %d; expected CONTINUATION following %s for stream %dx509: PKCS#8 wrapping contained private key with unknown algorithm: %vx509: certificate relies on legacy Common Name field, use SANs insteadMozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)Sogou Pic Spider/3.0(+http://www.sogou.com/docs/help/webmasters.htm#07)Sogou web spider/4.0(+http://www.sogou.com/docs/help/webmasters.htm#07)dynamic table size update MUST occur at the beginning of a header blockssh: no common algorithm for %s; client offered: %v, server offered: %vtls: peer doesn't support any of the certificate's signature algorithmstoo many concurrent operations on a single file or socket (max 1048575)x509: issuer has name constraints but leaf doesn't have a SAN extensionMozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)tls: server's certificate contains an unsupported type of public key: %Ttls: received unexpected handshake message of type %T when waiting for %T91289437fa036b34da55d57af6192768c27bd433fa012169d626d934e0051b24dd67dd3cf49d7cc827bc012d259d7ac226e70829239d7ac226e7082968de60d520eb433722c07fd236f6crypto/elliptic: internal error: Unmarshal rejected a valid point encodingmalformed response from server: malformed non-numeric status pseudo headernet/http: server replied with more than declared Content-Length; truncatedtls: certificate RSA key size too small for supported signature algorithmsUnsolicited response received on idle HTTP channel starting with %q; err=%vtls: internal error: attempted to read record with pending application datatls: failed to send closeNotify alert (but connection was closed anyway): %wtls: server certificate contains incorrect key type for selected ciphersuite((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})(\.((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})){3}MapIter.Next called on an iterator that does not have an associated map Valuecrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled115792089210356248762697446949407573529996955224135760342422259061068512044369115792089210356248762697446949407573530086143415290314195533631308867097853951ssh: internal error: algorithmSignerWrapper invoked with non-default algorithmssh: unable to authenticate, attempted methods %v, no supported methods remainx509: signature check attempt
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: http: RoundTripper implementation (%T) returned a nil *Response with a nil errortls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificaterefusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxyx509: a root or intermediate certificate is not authorized to sign for this name: (possibly because of %q while trying to verify candidate authority certificate %q)Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)x509: issuer has name constraints but leaf contains unknown or unconstrained name: tls: downgrade attempt detected, possibly due to a MitM attack or a broken middleboxx509: signature algorithm specifies an %s public key, but have public key of type %Treflect.Value.Interface: cannot return value obtained from unexported field or methodx509: failed to parse private key (use ParseECPrivateKey instead for this key format)Mozilla/5.0 (compatible; YoudaoBot/1.0; http://www.youdao.com/help/webmaster/spider/;)reflect: New of type that may not be allocated in heap (possibly undefined cgo C type)x509: a root or intermediate certificate is not authorized for an extended key usage: fxfzUc6gtMGc/i26ld3KydGKy1k7QqyMMyxjbU1Rlk+F9LQxnaTeCHGHsDUpaBeOWDeY6l+2kHlB7EWTLcGwfg==whv+Kf1cEtOXzr+zuvmef2as0WfbUDm8l2LMWBMel10NDnbShg9CsMUt327VJhOTbXLoPYJVTKy8MBPCVwoT8A==x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%qapplication/xml,application/xhtml+xml,text/html;q=0.9, text/plain;q=0.8,image/png,*/*;q=0.5tls: handshake hash for a client certificate requested after discarding the handshake buffertls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKey3617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b1ce1d7e819d7a431d7c90ea0e5faa87ca22be8b05378eb1c71ef320ad746e1d3b628ba79b9859f741e082542a385502f25dbf55296c3a545e3872760ab7b3312fa7e23ee7e4988e056be3f82d19181d9c6efe8141120314088f5013875ac656398d8a2ed19d2a85c8edd3ec2aefhttp: RoundTripper implementation (%T) returned a *Response with content length %d but a nil BodyNoClientCertRequestClientCertRequireAnyClientCertVerifyClientCertIfGivenRequireAndVerifyClientCertcipher: the nonce can't have zero length, or the security of the key will be immediately compromisedssh<<RMS>> equals www.yahoo.com (Yahoo)
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: global traffic DNS traffic detected: DNS query: aras.liveya.org
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)x509:
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: http://search.msn.com/msnbot.htm
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: http://www.baidu.com/search/spider.html)Mozilla/5.0
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: http://www.baidu.com/search/spider.html)http2:
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: http://www.youdao.com/help/webmaster/spider/;)reflect:
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: http://yandex.com/bots)http:
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: https://search.yahoo.com/search?p=illegal
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: https://www.baidu.com/s?wd=insufficient
Source: linux_arm64.elf, ls.19.dr, lsof.19.dr, bash_config.19.dr, find.19.dr, system-monitor.19.dr, ps.19.dr, ss.19.dr, dir.19.dr, System.img.config.19.dr, libdlrpcld.so.19.dr, id.services.conf.12.dr, netstat.19.dr String found in binary or memory: https://www.so.com/s?q=index
Source: ELF static info symbol of initial sample .symtab present: no
Source: /usr/bin/pkill (PID: 5644) SIGKILL sent: pid: 5570, result: successful
Source: /usr/bin/pkill (PID: 6076) SIGKILL sent: pid: 5737, result: successful
Source: classification engine Classification label: mal84.spre.troj.evad.linELF@0/145@4/0
Source: ELF file section Submission: linux_arm64.elf
Source: ELF file section Dropped file: id.services.conf.12.dr
Source: ELF file section Dropped file: System.img.config.19.dr
Source: ELF file section Dropped file: bash_config.19.dr
Source: ELF file section Dropped file: libdlrpcld.so.19.dr
Source: ELF file section Dropped file: system-monitor.19.dr
Source: ELF file section Dropped file: ps.19.dr
Source: ELF file section Dropped file: ss.19.dr
Source: ELF file section Dropped file: ls.19.dr
Source: ELF file section Dropped file: dir.19.dr
Source: ELF file section Dropped file: netstat.19.dr
Source: ELF file section Dropped file: find.19.dr
Source: ELF file section Dropped file: lsof.19.dr

Persistence and Installation Behavior

barindex
Source: /tmp/linux_arm64.elf (PID: 5568) File: /etc/profile.d/bash_config.sh Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /etc/profile.d/bash_config Jump to behavior
Source: /usr/bin/bash (PID: 5930) File: /etc/crontab
Source: /tmp/linux_arm64.elf (PID: 5552) File: /etc/id.services.conf (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5552) File: /etc/32678 (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /etc/profile.d/bash_config (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /etc/profile.d/bash_config Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/bin/netstat Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/bin/lsof Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/lib/system-monitor Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/bin/ls Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/lib/libdlrpcld.so Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/bin/find Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/bin/ss Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /boot/System.img.config Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/bin/dir Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /usr/bin/ps Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5552) File with SHA-256 869233C64937BB4D528E3D9C989F3C43EB97F45C0AD303D098FCFCEA3AFDBCD1 written: /etc/id.services.conf Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /dev/.old Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /dev/.img Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /.img Jump to behavior
Source: /etc/id.services.conf (PID: 6092) File: /dev/.old
Source: /etc/id.services.conf (PID: 6092) File: /dev/.img
Source: /boot/System.img.config (PID: 5735) File: /dev/.old
Source: /boot/System.img.config (PID: 5735) File: /dev/.img
Source: /boot/System.img.config (PID: 5735) Empty hidden file: /dev/.old
Source: /boot/System.img.config (PID: 5735) Empty hidden file: /dev/.img
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3760/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3760/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3761/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3761/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/5389/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/5389/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1583/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1583/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/2672/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/2672/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/110/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/110/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/111/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/111/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/112/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/112/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/113/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/113/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/234/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/234/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1577/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1577/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/114/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/114/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/235/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/235/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/115/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/115/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/116/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/116/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/117/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/117/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/118/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/118/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/119/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/119/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/10/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/10/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/917/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/917/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/11/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/11/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/12/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/12/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/13/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/13/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/14/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/14/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/15/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/15/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/16/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/16/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/17/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/17/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/18/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/18/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/19/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/19/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1593/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1593/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/240/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/240/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/120/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/120/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3094/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3094/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/121/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/121/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/242/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/242/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3406/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3406/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/122/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/122/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/243/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/243/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/2/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/2/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/123/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/123/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/244/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/244/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1589/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1589/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/124/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/124/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/245/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/245/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1588/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/1588/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/125/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/125/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/4/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/4/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/246/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/246/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3402/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/3402/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/126/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/126/cmdline
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/5/status
Source: /usr/bin/pkill (PID: 6076) File opened: /proc/5/cmdline
Source: /tmp/linux_arm64.elf (PID: 5557) Shell command executed: /bin/bash -c /etc/32678& Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5619) Shell command executed: /bin/bash -c "cd /boot;systemctl daemon-reload;systemctl enable linux.service;systemctl start linux.service;journalctl -xe --no-pager"
Source: /tmp/linux_arm64.elf (PID: 5851) Shell command executed: /bin/bash -c "cd /boot;ausearch -c 'System.img.conf' --raw | audit2allow -M my-Systemimgconf;semodule -X 300 -i my-Systemimgconf.pp"
Source: /usr/sbin/cron (PID: 6111) Shell command executed: /bin/sh -c "/.img "
Source: /boot/System.img.config (PID: 5644) Pkill executable: /usr/bin/pkill -> pkill -9 32678
Source: /etc/id.services.conf (PID: 6076) Pkill executable: /usr/bin/pkill -> pkill -9 32678
Source: /usr/sbin/service (PID: 5563) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service Jump to behavior
Source: /usr/sbin/service (PID: 5578) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target Jump to behavior
Source: /usr/sbin/service (PID: 5598) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket Jump to behavior
Source: /usr/sbin/update-rc.d (PID: 5591) Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reload
Source: /bin/bash (PID: 5621) Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reload
Source: /bin/bash (PID: 5625) Systemctl executable: /usr/bin/systemctl -> systemctl enable linux.service
Source: /bin/bash (PID: 5629) Systemctl executable: /usr/bin/systemctl -> systemctl start linux.service
Source: /usr/sbin/service (PID: 6017) Systemctl executable: /usr/bin/systemctl -> systemctl start cron.service
Source: /usr/sbin/service (PID: 6024) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target
Source: /usr/sbin/service (PID: 6026) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket
Source: /tmp/linux_arm64.elf (PID: 6055) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service
Source: /usr/sbin/service (PID: 6083) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service
Source: /usr/sbin/service (PID: 6103) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target
Source: /usr/sbin/service (PID: 6109) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket
Source: /usr/sbin/service (PID: 5729) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service
Source: /usr/sbin/service (PID: 5790) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target
Source: /usr/sbin/service (PID: 5800) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket
Source: /tmp/linux_arm64.elf (PID: 5552) File: /etc/id.services.conf (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5552) File: /etc/32678 (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /boot/System.img.config (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /etc/profile.d/bash_config (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/lib/libdlrpcld.so (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/lib/system-monitor (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/ps (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/ss (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/ls (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/dir (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/netstat (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/find (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/lsof (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5552) File written: /etc/id.services.conf Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /boot/System.img.config Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /etc/profile.d/bash_config Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/lib/libdlrpcld.so Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/lib/system-monitor Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/bin/ps Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/bin/ss Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/bin/ls Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/bin/dir Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/bin/netstat Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/bin/find Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File written: /usr/bin/lsof Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5552) Writes shell script file to disk with an unusual file extension: /etc/32678 Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) Writes shell script file to disk with an unusual file extension: /etc/init.d/linux_kill Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) Writes shell script file to disk with an unusual file extension: /.img Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) Writes shell script file to disk with an unusual file extension: /etc/init.d/ssh Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) Shell script file created: /etc/profile.d/bash_config.sh Jump to dropped file
Source: /usr/sbin/service (PID: 5599) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p Jump to behavior
Source: /usr/sbin/service (PID: 6027) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
Source: /usr/sbin/service (PID: 6110) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
Source: /usr/sbin/service (PID: 5801) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/linux_arm64.elf (PID: 5568) File: /etc/init.d/linux_kill Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /etc/init.d/ssh Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/ps Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/ss Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/ls Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/dir Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/netstat Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/find Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) File: /usr/bin/lsof Jump to dropped file
Source: unknown Network traffic detected: HTTP traffic on port 47718 -> 808
Source: unknown Network traffic detected: HTTP traffic on port 808 -> 47718
Source: /tmp/linux_arm64.elf (PID: 5568) Path: /usr/bin/ps Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) Path: /usr/bin/ss Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) Path: /usr/bin/ls Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) Path: /usr/bin/netstat Jump to dropped file
Source: /tmp/linux_arm64.elf (PID: 5568) Path: /usr/bin/lsof Jump to dropped file
Source: /etc/32678 (PID: 5575) Sleep executable: /usr/bin/sleep -> sleep 60 Jump to behavior
Source: /etc/32678 (PID: 5773) Sleep executable: /usr/bin/sleep -> sleep 60
Source: /etc/32678 (PID: 6099) Sleep executable: /usr/bin/sleep -> sleep 60
Source: /tmp/linux_arm64.elf (PID: 5568) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 5644) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/pkill (PID: 6076) Reads CPU info from /sys: /sys/devices/system/cpu/online
Source: /usr/bin/sleep (PID: 5575) Sleeps longer then 60s: 60.0s Jump to behavior
Source: /usr/bin/sleep (PID: 5773) Sleeps longer then 60s: 60.0s
Source: /usr/bin/sleep (PID: 6099) Sleeps longer then 60s: 60.0s
Source: /usr/sbin/cron (PID: 6044) Sleeps longer then 60s: 60.0s
Source: /tmp/linux_arm64.elf (PID: 5552) Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 5557) Queries kernel information via 'uname': Jump to behavior
Source: /tmp/linux_arm64.elf (PID: 5568) Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 5619) Queries kernel information via 'uname':
Source: /bin/bash (PID: 5851) Queries kernel information via 'uname':
Source: /usr/bin/bash (PID: 5930) Queries kernel information via 'uname':
Source: /boot/System.img.config (PID: 5630) Queries kernel information via 'uname':
Source: /etc/id.services.conf (PID: 6070) Queries kernel information via 'uname':
Source: /etc/id.services.conf (PID: 6092) Queries kernel information via 'uname':
Source: /boot/System.img.config (PID: 5735) Queries kernel information via 'uname':
Source: System.img.config, 5735.1.000055d6e2177000.000055d6e26f3000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/aarch64
Source: linux_arm64.elf, 5552.1.00007ffce1331000.00007ffce1352000.rw-.sdmp Binary or memory string: J3Fx86_64/usr/bin/qemu-aarch64/tmp/linux_arm64.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/linux_arm64.elf
Source: 32678, 6070.1.000055614abcd000.000055614b15e000.rw-.sdmp, id.services.conf, 6070.1.000055614abcd000.000055614b15e000.rw-.sdmp Binary or memory string: JaUrg.qemu.gdb.arm.sys.regs">
Source: System.img.config, 5735.1.000055d6e2177000.000055d6e26f3000.rw-.sdmp Binary or memory string: U1/etc/qemu-binfmt/aarch64O
Source: linux_arm64.elf, 5552.1.0000561f3dcf0000.0000561f3e23e000.rw-.sdmp Binary or memory string: Vrg.qemu.gdb.arm.sys.regs">
Source: id.services.conf, 6092.1.0000555b05ac9000.0000555b06001000.rw-.sdmp Binary or memory string: [Urg.qemu.gdb.arm.sys.regs">
Source: 32678, 6070.1.000055614abcd000.000055614b15e000.rw-.sdmp, id.services.conf, 6070.1.000055614abcd000.000055614b15e000.rw-.sdmp Binary or memory string: JaU1/etc/qemu-binfmt/aarch64O
Source: systemd, 5630.1.000056197a888000.000056197add8000.rw-.sdmp, System.img.config, 5630.1.000056197a888000.000056197add8000.rw-.sdmp Binary or memory string: Vrg.qemu.gdb.arm.sys.regs">@
Source: System.img.config, 5735.1.000055d6e2177000.000055d6e26f3000.rw-.sdmp Binary or memory string: Urg.qemu.gdb.arm.sys.regs">
Source: System.img.config, 5735.1.00007ffcaf565000.00007ffcaf586000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-aarch64/boot/System.img.config
Source: System.img.config, 5735.1.000055d6e2177000.000055d6e26f3000.rw-.sdmp Binary or memory string: rg.qemu.gdb.arm.sys.regs">
Source: 32678, 6070.1.00007ffef4d11000.00007ffef4d32000.rw-.sdmp, id.services.conf, 6070.1.00007ffef4d11000.00007ffef4d32000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-aarch64/etc/id.services.confJOURNAL_STREAM=9:66759PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binINVOCATION_ID=d9e61a75e29a46fb8e5ae89a0cc36b79LANG=en_US.UTF-8PWD=//etc/id.services.conf
Source: id.services.conf, 6092.1.00007fff8d29e000.00007fff8d2bf000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-aarch64/etc/id.services.conf
Source: id.services.conf, 6092.1.0000555b05ac9000.0000555b06001000.rw-.sdmp Binary or memory string: [U1/etc/qemu-binfmt/aarch64O
Source: linux_arm64.elf, 5552.1.0000561f3dcf0000.0000561f3e23e000.rw-.sdmp, systemd, 5630.1.000056197a888000.000056197add8000.rw-.sdmp, System.img.config, 5630.1.000056197a888000.000056197add8000.rw-.sdmp Binary or memory string: V1/etc/qemu-binfmt/aarch64O
Source: System.img.config, 5735.1.00007ffcaf565000.00007ffcaf586000.rw-.sdmp Binary or memory string: /usr/bin/qemu-aarch64
Source: systemd, 5630.1.00007fffc8cb2000.00007fffc8cd3000.rw-.sdmp, System.img.config, 5630.1.00007fffc8cb2000.00007fffc8cd3000.rw-.sdmp Binary or memory string: Ox86_64/usr/bin/qemu-aarch64/boot/System.img.configLANG=en_US.UTF-8PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binINVOCATION_ID=d9e61a75e29a46fb8e5ae89a0cc36b79JOURNAL_STREAM=9:66759/boot/System.img.config

Stealing of Sensitive Information

barindex
Source: Yara match File source: linux_arm64.elf, type: SAMPLE
Source: Yara match File source: /usr/bin/lsof, type: DROPPED
Source: Yara match File source: /etc/profile.d/bash_config, type: DROPPED
Source: Yara match File source: /usr/lib/system-monitor, type: DROPPED
Source: Yara match File source: /usr/bin/find, type: DROPPED
Source: Yara match File source: /usr/bin/ps, type: DROPPED
Source: Yara match File source: /etc/id.services.conf, type: DROPPED
Source: Yara match File source: /usr/bin/netstat, type: DROPPED
Source: Yara match File source: /usr/lib/libdlrpcld.so, type: DROPPED
Source: Yara match File source: /usr/bin/ls, type: DROPPED
Source: Yara match File source: /usr/bin/dir, type: DROPPED
Source: Yara match File source: /usr/bin/ss, type: DROPPED
Source: Yara match File source: /boot/System.img.config, type: DROPPED

Remote Access Functionality

barindex
Source: Yara match File source: linux_arm64.elf, type: SAMPLE
Source: Yara match File source: /usr/bin/lsof, type: DROPPED
Source: Yara match File source: /etc/profile.d/bash_config, type: DROPPED
Source: Yara match File source: /usr/lib/system-monitor, type: DROPPED
Source: Yara match File source: /usr/bin/find, type: DROPPED
Source: Yara match File source: /usr/bin/ps, type: DROPPED
Source: Yara match File source: /etc/id.services.conf, type: DROPPED
Source: Yara match File source: /usr/bin/netstat, type: DROPPED
Source: Yara match File source: /usr/lib/libdlrpcld.so, type: DROPPED
Source: Yara match File source: /usr/bin/ls, type: DROPPED
Source: Yara match File source: /usr/bin/dir, type: DROPPED
Source: Yara match File source: /usr/bin/ss, type: DROPPED
Source: Yara match File source: /boot/System.img.config, type: DROPPED
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs