Edit tour
Linux
Analysis Report
linux_arm64.elf
Overview
General Information
Sample name: | linux_arm64.elf |
Analysis ID: | 1562738 |
MD5: | 287250a348dd465f040bc52319296693 |
SHA1: | d79a34f42217d8b84c2078b748a6a3fad02b1a8c |
SHA256: | 869233c64937bb4d528e3d9c989f3c43eb97f45c0ad303d098fcfcea3afdbcd1 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Chaos
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Chaos
Connects to many ports of the same IP (likely port scanning)
Drops files in suspicious directories
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using cron
Sample tries to set files in /etc globally writable
Uses known network protocols on non-standard ports
Writes identical ELF files to multiple locations
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Detected TCP or UDP traffic on non-standard ports
Drops files with innocent-looking names
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "kill" or "pkill" command typically used to terminate processes
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads CPU information from /sys indicative of miner or evasive malware
Reads the 'hosts' file potentially containing internal network hosts
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Sleeps for long times indicative of sandbox evasion
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk
Writes shell script file to disk with an unusual file extension
Writes shell script files to disk
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1562738 |
Start date and time: | 2024-11-25 23:54:32 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | linux_arm64.elf |
Detection: | MAL |
Classification: | mal84.spre.troj.evad.linELF@0/145@4/0 |
- Report size exceeded maximum capacity and may have missing behavior information.
- VT rate limit hit for: linux_arm64.elf
Command: | /tmp/linux_arm64.elf |
PID: | 5552 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: |
- system is lnxubuntu20
- linux_arm64.elf New Fork (PID: 5557, Parent: 5552)
- linux_arm64.elf New Fork (PID: 5563, Parent: 5552)
- service New Fork (PID: 5574, Parent: 5563)
- service New Fork (PID: 5576, Parent: 5563)
- service New Fork (PID: 5578, Parent: 5563)
- linux_arm64.elf New Fork (PID: 5568, Parent: 5552)
- linux_arm64.elf New Fork (PID: 5588, Parent: 5568)
- update-rc.d New Fork (PID: 5591, Parent: 5588)
- linux_arm64.elf New Fork (PID: 5619, Parent: 5568)
- bash New Fork (PID: 5621, Parent: 5619)
- bash New Fork (PID: 5625, Parent: 5619)
- bash New Fork (PID: 5629, Parent: 5619)
- bash New Fork (PID: 5746, Parent: 5619)
- linux_arm64.elf New Fork (PID: 5851, Parent: 5568)
- bash New Fork (PID: 5854, Parent: 5851)
- bash New Fork (PID: 5855, Parent: 5851)
- bash New Fork (PID: 5856, Parent: 5851)
- linux_arm64.elf New Fork (PID: 5930, Parent: 5568)
- linux_arm64.elf New Fork (PID: 5985, Parent: 5568)
- linux_arm64.elf New Fork (PID: 5991, Parent: 5568)
- linux_arm64.elf New Fork (PID: 6017, Parent: 5568)
- service New Fork (PID: 6022, Parent: 6017)
- service New Fork (PID: 6023, Parent: 6017)
- service New Fork (PID: 6024, Parent: 6017)
- linux_arm64.elf New Fork (PID: 6055, Parent: 5568)
- systemd New Fork (PID: 5604, Parent: 5603)
- systemd New Fork (PID: 5623, Parent: 5622)
- systemd New Fork (PID: 5627, Parent: 5626)
- systemd New Fork (PID: 5630, Parent: 1)
- System.img.config New Fork (PID: 5644, Parent: 5630)
- System.img.config New Fork (PID: 5724, Parent: 5630)
- sh New Fork (PID: 5737, Parent: 5724)
- 32678 New Fork (PID: 5773, Parent: 5737)
- 32678 New Fork (PID: 6070, Parent: 5737)
- id.services.conf New Fork (PID: 6076, Parent: 6070)
- id.services.conf New Fork (PID: 6081, Parent: 6070)
- id.services.conf New Fork (PID: 6083, Parent: 6070)
- service New Fork (PID: 6098, Parent: 6083)
- service New Fork (PID: 6100, Parent: 6083)
- service New Fork (PID: 6103, Parent: 6083)
- id.services.conf New Fork (PID: 6092, Parent: 6070)
- System.img.config New Fork (PID: 5729, Parent: 5630)
- service New Fork (PID: 5744, Parent: 5729)
- service New Fork (PID: 5789, Parent: 5729)
- service New Fork (PID: 5790, Parent: 5729)
- System.img.config New Fork (PID: 5735, Parent: 5630)
- sshd New Fork (PID: 5829, Parent: 940)
- sshd New Fork (PID: 5853, Parent: 940)
- sshd New Fork (PID: 5868, Parent: 5853)
- sshd New Fork (PID: 5879, Parent: 940)
- sshd New Fork (PID: 5882, Parent: 940)
- sshd New Fork (PID: 5891, Parent: 5882)
- sshd New Fork (PID: 5892, Parent: 940)
- sshd New Fork (PID: 5899, Parent: 5892)
- sshd New Fork (PID: 5912, Parent: 940)
- sshd New Fork (PID: 5920, Parent: 5912)
- udisksd New Fork (PID: 6004, Parent: 803)
- systemd New Fork (PID: 6044, Parent: 1)
- systemd New Fork (PID: 6130, Parent: 1)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Chaos | Multi-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security | ||
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security | ||
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security | ||
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security | ||
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security | ||
Click to see the 7 entries |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | |||
Source: | Reads CPU info from /sys: |
Networking |
---|
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | Reads hosts file: | Jump to behavior |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |