Linux Analysis Report
linux_amd64.elf

Overview

General Information

Sample name: linux_amd64.elf
Analysis ID: 1562739
MD5: 31c17748082dea13683a54b0937b9169
SHA1: 274781228fc66e3b8d6b8dfff630a93cc5aadb1d
SHA256: 91166d1b2860195fdedbf252555923ad5e6ee9bbac1be945428a7776d46fa7b2
Tags: elfuser-abuse_ch
Infos:

Detection

Chaos
Score: 84
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Chaos
Connects to many ports of the same IP (likely port scanning)
Drops files in suspicious directories
Machine Learning detection for sample
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using cron
Sample tries to set files in /etc globally writable
Uses known network protocols on non-standard ports
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "kill" or "pkill" command typically used to terminate processes
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads CPU information from /sys indicative of miner or evasive malware
Reads the 'hosts' file potentially containing internal network hosts
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Sleeps for long times indicative of sandbox evasion
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension
Writes shell script files to disk

Classification

AV Detection

barindex
Source: linux_amd64.elf ReversingLabs: Detection: 52%
Source: linux_amd64.elf Joe Sandbox ML: detected
Source: /usr/bin/pkill (PID: 6342) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6684) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior

Networking

barindex
Source: global traffic TCP traffic: 103.135.101.78 ports 808,52462,2,4,5,6
Source: unknown Network traffic detected: HTTP traffic on port 48764 -> 808
Source: unknown Network traffic detected: HTTP traffic on port 808 -> 48764
Source: global traffic TCP traffic: 192.168.2.23:40518 -> 103.135.101.78:52462
Source: /tmp/linux_amd64.elf (PID: 6272) Reads hosts file: /etc/hosts Jump to behavior
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /password.txt HTTP/1.1Host: 103.135.101.78:808User-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: linux_amd64.elf String found in binary or memory: http2: Transport conn %p received error from processing frame %v: %vhttp2: Transport received unsolicited DATA frame; closing connectionhttp: message cannot contain multiple Content-Length headers; got %qpadding bytes must all be zeros unless AllowIllegalWrites is enabledreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerhttp2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)tls: handshake message of length %d bytes exceeds maximum of %d bytestls: peer doesn't support the certificate custom signature algorithmsbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xgot %s for stream %d; expected CONTINUATION following %s for stream %dx509: PKCS#8 wrapping contained private key with unknown algorithm: %vx509: certificate relies on legacy Common Name field, use SANs insteadMozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)Sogou Pic Spider/3.0(+http://www.sogou.com/docs/help/webmasters.htm#07)Sogou web spider/4.0(+http://www.sogou.com/docs/help/webmasters.htm#07)dynamic table size update MUST occur at the beginning of a header blockssh: no common algorithm for %s; client offered: %v, server offered: %vtls: peer doesn't support any of the certificate's signature algorithmstoo many concurrent operations on a single file or socket (max 1048575)x509: issuer has name constraints but leaf doesn't have a SAN extensionMozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)tls: server's certificate contains an unsupported type of public key: %Ttls: received unexpected handshake message of type %T when waiting for %T91289437fa036b34da55d57af6192768c27bd433fa012169d626d934e0051b24dd67dd3cf49d7cc827bc012d259d7ac226e70829239d7ac226e7082968de60d520eb433722c07fd236f6crypto/elliptic: internal error: Unmarshal rejected a valid point encodingmalformed response from server: malformed non-numeric status pseudo headernet/http: server replied with more than declared Content-Length; truncatedtls: certificate RSA key size too small for supported signature algorithmsUnsolicited response received on idle HTTP channel starting with %q; err=%vtls: internal error: attempted to read record with pending application datatls: failed to send closeNotify alert (but connection was closed anyway): %wtls: server certificate contains incorrect key type for selected ciphersuite((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})(\.((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})){3}MapIter.Next called on an iterator that does not have an associated map Valuecrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled115792089210356248762697446949407573529996955224135760342422259061068512044369115792089210356248762697446949407573530086143415290314195533631308867097853951ssh: internal error: algorithmSignerWrapper invoked with non-default algorithmssh: unable to authenticate, attempted methods %v, no supported methods remainx509: signature check attempt
Source: linux_amd64.elf String found in binary or memory: http: RoundTripper implementation (%T) returned a nil *Response with a nil errortls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificaterefusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxyx509: a root or intermediate certificate is not authorized to sign for this name: (possibly because of %q while trying to verify candidate authority certificate %q)Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)x509: issuer has name constraints but leaf contains unknown or unconstrained name: tls: downgrade attempt detected, possibly due to a MitM attack or a broken middleboxx509: signature algorithm specifies an %s public key, but have public key of type %Treflect.Value.Interface: cannot return value obtained from unexported field or methodx509: failed to parse private key (use ParseECPrivateKey instead for this key format)Mozilla/5.0 (compatible; YoudaoBot/1.0; http://www.youdao.com/help/webmaster/spider/;)reflect: New of type that may not be allocated in heap (possibly undefined cgo C type)x509: a root or intermediate certificate is not authorized for an extended key usage: fxfzUc6gtMGc/i26ld3KydGKy1k7QqyMMyxjbU1Rlk+F9LQxnaTeCHGHsDUpaBeOWDeY6l+2kHlB7EWTLcGwfg==whv+Kf1cEtOXzr+zuvmef2as0WfbUDm8l2LMWBMel10NDnbShg9CsMUt327VJhOTbXLoPYJVTKy8MBPCVwoT8A==x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%qapplication/xml,application/xhtml+xml,text/html;q=0.9, text/plain;q=0.8,image/png,*/*;q=0.5tls: handshake hash for a client certificate requested after discarding the handshake buffertls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKey3617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b1ce1d7e819d7a431d7c90ea0e5faa87ca22be8b05378eb1c71ef320ad746e1d3b628ba79b9859f741e082542a385502f25dbf55296c3a545e3872760ab7b3312fa7e23ee7e4988e056be3f82d19181d9c6efe8141120314088f5013875ac656398d8a2ed19d2a85c8edd3ec2aefhttp: RoundTripper implementation (%T) returned a *Response with content length %d but a nil BodyNoClientCertRequestClientCertRequireAnyClientCertVerifyClientCertIfGivenRequireAndVerifyClientCertcipher: the nonce can't have zero length, or the security of the key will be immediately compromisedssh<<RMS>> equals www.yahoo.com (Yahoo)
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: global traffic DNS traffic detected: DNS query: aras.liveya.org
Source: linux_amd64.elf String found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)x509:
Source: linux_amd64.elf String found in binary or memory: http://search.msn.com/msnbot.htm
Source: linux_amd64.elf String found in binary or memory: http://www.baidu.com/search/spider.html)
Source: linux_amd64.elf String found in binary or memory: http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829
Source: linux_amd64.elf String found in binary or memory: http://www.baidu.com/search/spider.html)Mozilla/5.0
Source: linux_amd64.elf String found in binary or memory: http://www.baidu.com/search/spider.html)http2:
Source: linux_amd64.elf String found in binary or memory: http://www.entireweb.com/about/search_tech/speedy_spider/)text/html
Source: linux_amd64.elf String found in binary or memory: http://www.google.com/mobile/adsbot.html)
Source: linux_amd64.elf String found in binary or memory: http://www.haosou.com/help/help_3_2.htmlMozilla/5.0
Source: linux_amd64.elf String found in binary or memory: http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0
Source: linux_amd64.elf String found in binary or memory: http://www.youdao.com/help/webmaster/spider/;)reflect:
Source: linux_amd64.elf String found in binary or memory: http://yandex.com/bots)http:
Source: linux_amd64.elf String found in binary or memory: https://search.yahoo.com/search?p=illegal
Source: linux_amd64.elf String found in binary or memory: https://www.baidu.com/s?wd=insufficient
Source: linux_amd64.elf String found in binary or memory: https://www.so.com/s?q=index
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: /usr/bin/pkill (PID: 6342) SIGKILL sent: pid: 6273, result: successful Jump to behavior
Source: /usr/bin/pkill (PID: 6684) SIGKILL sent: pid: 6361, result: successful Jump to behavior
Source: classification engine Classification label: mal84.spre.troj.evad.linELF@0/18@4/0
Source: ELF file section Submission: linux_amd64.elf

Persistence and Installation Behavior

barindex
Source: /tmp/linux_amd64.elf (PID: 6272) File: /etc/profile.d/bash_config.sh Jump to behavior
Source: /usr/bin/bash (PID: 6406) File: /etc/crontab Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6265) File: /etc/id.services.conf (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6265) File: /etc/32678 (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /etc/profile.d/bash_config (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /dev/.old Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /dev/.img Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /.img Jump to behavior
Source: /etc/id.services.conf (PID: 6688) File: /dev/.old
Source: /etc/id.services.conf (PID: 6688) File: /dev/.img
Source: /boot/System.img.config (PID: 6360) File: /dev/.old
Source: /boot/System.img.config (PID: 6360) File: /dev/.img
Source: /boot/System.img.config (PID: 6360) Empty hidden file: /dev/.old
Source: /boot/System.img.config (PID: 6360) Empty hidden file: /dev/.img
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6351/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6351/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6351/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6351/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6351/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6350/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6350/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6350/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6350/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6350/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6350/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6353/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6353/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6353/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6353/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6353/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6352/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6352/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6352/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6352/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6352/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6355/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6355/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6355/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6355/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6355/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6355/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6354/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6354/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6354/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6354/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6354/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6354/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6357/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6357/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6357/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6357/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6357/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6357/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6356/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6356/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6356/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6356/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/6356/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/1582/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File opened: /proc/3088/stat Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6270) Shell command executed: /bin/bash -c /etc/32678& Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6315) Shell command executed: /bin/bash -c "cd /boot;systemctl daemon-reload;systemctl enable linux.service;systemctl start linux.service;journalctl -xe --no-pager" Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6402) Shell command executed: /bin/bash -c "cd /boot;ausearch -c 'System.img.conf' --raw | audit2allow -M my-Systemimgconf;semodule -X 300 -i my-Systemimgconf.pp" Jump to behavior
Source: /usr/sbin/cron (PID: 6713) Shell command executed: /bin/sh -c "/.img "
Source: /boot/System.img.config (PID: 6342) Pkill executable: /usr/bin/pkill -> pkill -9 32678 Jump to behavior
Source: /etc/id.services.conf (PID: 6684) Pkill executable: /usr/bin/pkill -> pkill -9 32678 Jump to behavior
Source: /usr/sbin/service (PID: 6271) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service Jump to behavior
Source: /usr/sbin/service (PID: 6286) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target Jump to behavior
Source: /usr/sbin/service (PID: 6291) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket Jump to behavior
Source: /usr/sbin/update-rc.d (PID: 6287) Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reload Jump to behavior
Source: /bin/bash (PID: 6316) Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reload Jump to behavior
Source: /bin/bash (PID: 6320) Systemctl executable: /usr/bin/systemctl -> systemctl enable linux.service Jump to behavior
Source: /bin/bash (PID: 6324) Systemctl executable: /usr/bin/systemctl -> systemctl start linux.service Jump to behavior
Source: /usr/sbin/service (PID: 6433) Systemctl executable: /usr/bin/systemctl -> systemctl start cron.service Jump to behavior
Source: /usr/sbin/service (PID: 6452) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target Jump to behavior
Source: /usr/sbin/service (PID: 6507) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6586) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service Jump to behavior
Source: /usr/sbin/service (PID: 6686) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service
Source: /usr/sbin/service (PID: 6699) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target
Source: /usr/sbin/service (PID: 6701) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket
Source: /usr/sbin/service (PID: 6359) Systemctl executable: /usr/bin/systemctl -> systemctl start crond.service
Source: /usr/sbin/service (PID: 6378) Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target
Source: /usr/sbin/service (PID: 6380) Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket
Source: /tmp/linux_amd64.elf (PID: 6265) File: /etc/id.services.conf (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6265) File: /etc/32678 (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /boot/System.img.config (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /etc/profile.d/bash_config (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/lib/libdlrpcld.so (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/lib/system-monitor (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/bin/ps (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/bin/ss (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/bin/ls (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/bin/dir (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/bin/netstat (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/bin/find (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) File: /usr/bin/lsof (bits: - usr: rx grp: rx all: rwx) Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6265) Writes shell script file to disk with an unusual file extension: /etc/32678 Jump to dropped file
Source: /tmp/linux_amd64.elf (PID: 6272) Writes shell script file to disk with an unusual file extension: /etc/init.d/linux_kill Jump to dropped file
Source: /tmp/linux_amd64.elf (PID: 6272) Writes shell script file to disk with an unusual file extension: /.img Jump to dropped file
Source: /tmp/linux_amd64.elf (PID: 6272) Writes shell script file to disk with an unusual file extension: /etc/init.d/ssh Jump to dropped file
Source: /tmp/linux_amd64.elf (PID: 6272) Shell script file created: /etc/profile.d/bash_config.sh Jump to dropped file
Source: /usr/sbin/service (PID: 6292) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p Jump to behavior
Source: /usr/sbin/service (PID: 6508) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p Jump to behavior
Source: /usr/sbin/service (PID: 6702) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
Source: /usr/sbin/service (PID: 6381) Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/linux_amd64.elf (PID: 6272) File: /etc/init.d/linux_kill Jump to dropped file
Source: /tmp/linux_amd64.elf (PID: 6272) File: /etc/init.d/ssh Jump to dropped file
Source: unknown Network traffic detected: HTTP traffic on port 48764 -> 808
Source: unknown Network traffic detected: HTTP traffic on port 808 -> 48764
Source: /etc/32678 (PID: 6284) Sleep executable: /usr/bin/sleep -> sleep 60 Jump to behavior
Source: /etc/32678 (PID: 6374) Sleep executable: /usr/bin/sleep -> sleep 60 Jump to behavior
Source: /etc/32678 (PID: 6697) Sleep executable: /usr/bin/sleep -> sleep 60
Source: /usr/bin/pkill (PID: 6342) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/pkill (PID: 6684) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
Source: /usr/bin/sleep (PID: 6284) Sleeps longer then 60s: 60.0s Jump to behavior
Source: /usr/bin/sleep (PID: 6374) Sleeps longer then 60s: 60.0s Jump to behavior
Source: /usr/bin/sleep (PID: 6697) Sleeps longer then 60s: 60.0s
Source: /usr/sbin/cron (PID: 6575) Sleeps longer then 60s: 60.0s
Source: /usr/sbin/cron (PID: 6733) Sleeps longer then 60s: 60.0s
Source: /tmp/linux_amd64.elf (PID: 6265) Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 6270) Queries kernel information via 'uname': Jump to behavior
Source: /tmp/linux_amd64.elf (PID: 6272) Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 6315) Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 6402) Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/bash (PID: 6406) Queries kernel information via 'uname': Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: linux_amd64.elf, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: linux_amd64.elf, type: SAMPLE
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs