Linux Analysis Report
res.arc.elf

Overview

General Information

Sample name: res.arc.elf
Analysis ID: 1592289
MD5: 0c3081e9b4419cad6d6030711af33470
SHA1: 53b6232be50ce7f134ed0ae7cd88de1e90b02c89
SHA256: 8c691db519531411ec36e92ee90dc810b99a918442f774162f85a3b9486e689a
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

AV Detection

barindex
Source: res.arc.elf Virustotal: Detection: 28% Perma Link
Source: res.arc.elf ReversingLabs: Detection: 36%
Source: global traffic TCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
Source: unknown TCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknown TCP traffic detected without corresponding DNS query: 185.125.190.26
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknown Network traffic detected: HTTP traffic on port 46540 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal48.linELF@0/0@2/0
Source: /usr/bin/dash (PID: 5468) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.T4qkq2sBUj /tmp/tmp.GJ3lDjyzWj /tmp/tmp.VLf1183ky7 Jump to behavior
Source: /usr/bin/dash (PID: 5469) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.T4qkq2sBUj /tmp/tmp.GJ3lDjyzWj /tmp/tmp.VLf1183ky7 Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs