MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c58a9423d151407e4c432da5a28a4942a09030020fd89f1b7cc1f5bc569a2b60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA 7 File information Comments 1

SHA256 hash: c58a9423d151407e4c432da5a28a4942a09030020fd89f1b7cc1f5bc569a2b60
SHA3-384 hash: 22830d57c242cd2598f427bc470abb9cfc7fc071b22d29bb5ce1e1520739b3ae7ce987d58d325bfe5bdd13b0b50393c8
SHA1 hash: ad36f402f6ab4eadc0b7d2b264ea2e85f5ed295d
MD5 hash: 63945044a721e944cfad5d1223a109d4
humanhash: fish-one-fruit-kitten
File name:63945044a721e944cfad5d1223a109d4
Download: download sample
File size:2'027'704 bytes
First seen:2024-10-16 08:06:07 UTC
Last seen:2024-10-16 09:37:41 UTC
File type: elf
MIME type:application/x-executable
ssdeep 49152:uep69Tp5D+H0U2vE6d8evX3YugL5jioIewEZq5BW:u19DD+H0rc6pv3YugL5F1wQq5o
TLSH T1DC953387D23824ADB6A78A5E41B9767DD0C57246E0F660314FD9A78BEB307D2C3E2047
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter zbetcheckin
Tags:64 elf

Intelligence


File Origin
# of uploads :
2
# of downloads :
94
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
chacha monero obfuscated packed rijndael upx
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.evad
Score:
72 / 100
Signature
Drops files in suspicious directories
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using cron
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1534900 Sample: sBKWt6JPZa.elf Startdate: 16/10/2024 Architecture: LINUX Score: 72 85 27.30.77.93, 4444, 50706, 50708 CHINANET-BACKBONENo31Jin-rongStreetCN China 2->85 87 www.google.com 2->87 89 Multi AV Scanner detection for submitted file 2->89 91 Sample is packed with UPX 2->91 11 sBKWt6JPZa.elf 2->11         started        13 systemd cron 2->13         started        15 systemd cron 2->15         started        17 5 other processes 2->17 signatures3 process4 process5 19 sBKWt6JPZa.elf sBKWt6JPZa.elf 11->19         started        23 cron 13->23         started        25 cron 13->25         started        27 cron 15->27         started        file6 75 /etc/profile.d/gateway.sh, Bourne-Again 19->75 dropped 77 /etc/profile.d/bash.cfg.sh, Bourne-Again 19->77 dropped 79 /etc/init.d/x11-common, POSIX 19->79 dropped 81 44 other files (43 malicious) 19->81 dropped 93 Sample tries to set files in /etc globally writable 19->93 95 Sample tries to persist itself using /etc/profile 19->95 97 Drops files in suspicious directories 19->97 29 sBKWt6JPZa.elf bash 19->29         started        33 sBKWt6JPZa.elf update-rc.d 19->33         started        35 sBKWt6JPZa.elf service systemctl 19->35         started        43 4 other processes 19->43 37 cron sh 23->37         started        39 cron sh 25->39         started        41 cron sh 27->41         started        signatures7 process8 file9 83 /etc/crontab, ASCII 29->83 dropped 99 Sample tries to persist itself using cron 29->99 101 Sample tries to persist itself using System V runlevels 33->101 45 update-rc.d systemctl 33->45         started        47 service 35->47         started        59 3 other processes 35->59 49 sh .mod 37->49         started        51 sh .mod 41->51         started        53 bash systemctl 43->53         started        55 bash systemctl 43->55         started        57 bash systemctl 43->57         started        61 4 other processes 43->61 signatures10 process11 process12 63 service systemctl 47->63         started        65 service sed 47->65         started        67 .mod libgdi.so.0.8.2 49->67         started        69 .mod libgdi.so.0.8.2 51->69         started        process13 71 libgdi.so.0.8.2 libgdi.so.0.8.2 67->71         started        73 libgdi.so.0.8.2 libgdi.so.0.8.2 69->73         started       
Threat name:
Linux.Trojan.Kaiji
Status:
Malicious
First seen:
2024-10-16 08:07:06 UTC
File Type:
ELF64 Little (Exe)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery linux persistence privilege_escalation upx
Behaviour
Enumerates kernel/hardware configuration
Reads runtime system information
Modifies Bash startup script
UPX packed file
Creates/modifies environment variables
Modifies init.d
Modifies Watchdog functionality
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:GoBinTest
Rule name:golang_binary_string
Description:Golang strings present
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SUSP_ELF_LNX_UPX_Compressed_File
Author:Florian Roth (Nextron Systems)
Description:Detects a suspicious ELF binary with UPX compression
Reference:Internal Research
Rule name:upx_packed_elf_v1
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf c58a9423d151407e4c432da5a28a4942a09030020fd89f1b7cc1f5bc569a2b60

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh

Comments



Avatar
zbet commented on 2024-10-16 08:06:08 UTC

url : hxxp://209.141.47.218/amd64