Source: na.elf |
ReversingLabs: Detection: 50% |
Source: /tmp/na.elf (PID: 6256) |
Reads CPU info from proc file: /proc/cpuinfo |
Jump to behavior |
Source: /tmp/na.elf (PID: 6256) |
Reads CPU info from /sys: /sys/devices/system/cpu/online |
Jump to behavior |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:58998 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59020 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59018 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59006 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59008 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59000 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59030 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59014 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019177 - Severity 1 - ET MALWARE Linux/AES.DDoS Sending Real/Fake CPU&BW Info : 192.168.2.23:59008 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59034 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59036 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:58994 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:58996 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019177 - Severity 1 - ET MALWARE Linux/AES.DDoS Sending Real/Fake CPU&BW Info : 192.168.2.23:59036 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:58992 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59004 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:58990 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59022 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59012 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59038 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59024 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59010 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59032 -> 116.205.177.132:10210 |
Source: Network traffic |
Suricata IDS: 2019172 - Severity 1 - ET MALWARE Linux.DDoS Checkin : 192.168.2.23:59026 -> 116.205.177.132:10210 |
Source: global traffic |
TCP traffic: 192.168.2.23:58990 -> 116.205.177.132:10210 |
Source: /tmp/na.elf (PID: 6256) |
Reads hosts file: /etc/hosts |
Jump to behavior |
Source: global traffic |
TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443 |
Source: global traffic |
TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443 |
Source: global traffic |
TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.43 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.202.202.202 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.205.177.132 |
Source: global traffic |
DNS traffic detected: DNS query: mhacker.cc |
Source: na.elf |
String found in binary or memory: http://upx.sf.net |
Source: na.elf, 6239.1.0000000000400000.00000000005ae000.r-x.sdmp |
String found in binary or memory: https://bugs.launchpad.net/ubuntu/ |
Source: unknown |
Network traffic detected: HTTP traffic on port 43928 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 42836 -> 443 |
Source: 6239.1.0000000000400000.00000000005ae000.r-x.sdmp, type: MEMORY |
Matched rule: Detects malware from disclosed CN malware set Author: Florian Roth |
Source: LOAD without section mappings |
Program segment: 0x400000 |
Source: 6239.1.0000000000400000.00000000005ae000.r-x.sdmp, type: MEMORY |
Matched rule: CN_disclosed_20180208_lsls date = 2018-02-08, hash1 = 94c6a92984df9ed255f4c644261b01c4e255acbe32ddfd0debe38b558f29a6c9, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: classification engine |
Classification label: mal72.evad.linELF@0/6@3/0 |
Source: initial sample |
String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $ |
Source: initial sample |
String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $ |
Source: initial sample |
String containing UPX found: $Id: UPX 3.91 Copyright (C) 1996-2013 the UPX Team. All Rights Reserved. $ |
Source: /tmp/na.elf (PID: 6240) |
Shell command executed: sh -c "sed -i -e '/exit/d' /etc/rc.local>nul 2>nul" |
Jump to behavior |
Source: /tmp/na.elf (PID: 6242) |
Shell command executed: sh -c "sed -i -e '/^\r\n|\r|\n$/d' /etc/rc.local>nul 2>nul" |
Jump to behavior |
Source: /tmp/na.elf (PID: 6244) |
Shell command executed: sh -c "sed -i -e '/na.elf reboot/d' /etc/rc.local>nul 2>nul" |
Jump to behavior |
Source: /tmp/na.elf (PID: 6246) |
Shell command executed: sh -c "sed -i -e '2 i/tmp/na.elf reboot' /etc/rc.local>nul 2>nul" |
Jump to behavior |
Source: /tmp/na.elf (PID: 6248) |
Shell command executed: sh -c "sed -i -e '2 i/tmp/na.elf reboot start' /etc/rc.d/rc.local>nul 2>nul" |
Jump to behavior |
Source: /tmp/na.elf (PID: 6250) |
Shell command executed: sh -c "sed -i -e '2 i/tmp/na.elf reboot start' /etc/init.d/boot.local>nul 2>nul" |
Jump to behavior |
Source: /tmp/na.elf (PID: 6252) |
Shell command executed: sh -c "rm -rf nul" |
Jump to behavior |
Source: /tmp/na.elf (PID: 6254) |
Shell command executed: sh -c "rm -rf nul 2" |
Jump to behavior |
Source: /bin/sh (PID: 6253) |
Rm executable: /usr/bin/rm -> rm -rf nul |
Jump to behavior |
Source: /bin/sh (PID: 6255) |
Rm executable: /usr/bin/rm -> rm -rf nul 2 |
Jump to behavior |
Source: /tmp/na.elf (PID: 6256) |
Reads from proc file: /proc/cpuinfo |
Jump to behavior |
Source: /tmp/na.elf (PID: 6256) |
Reads from proc file: /proc/stat |
Jump to behavior |
Source: /bin/sh (PID: 6241) |
Sed executable: /usr/bin/sed -> sed -i -e /exit/d /etc/rc.local |
Jump to behavior |
Source: /bin/sh (PID: 6243) |
Sed executable: /usr/bin/sed -> sed -i -e /^||$/d /etc/rc.local |
Jump to behavior |
Source: /bin/sh (PID: 6245) |
Sed executable: /usr/bin/sed -> sed -i -e "/na.elf reboot/d" /etc/rc.local |
Jump to behavior |
Source: /bin/sh (PID: 6247) |
Sed executable: /usr/bin/sed -> sed -i -e "2 i/tmp/na.elf reboot" /etc/rc.local |
Jump to behavior |
Source: /bin/sh (PID: 6249) |
Sed executable: /usr/bin/sed -> sed -i -e "2 i/tmp/na.elf reboot start" /etc/rc.d/rc.local |
Jump to behavior |
Source: /bin/sh (PID: 6251) |
Sed executable: /usr/bin/sed -> sed -i -e "2 i/tmp/na.elf reboot start" /etc/init.d/boot.local |
Jump to behavior |
Source: na.elf |
Submission file: segment LOAD with 7.9398 entropy (max. 8.0) |
Source: /tmp/na.elf (PID: 6256) |
Reads CPU info from proc file: /proc/cpuinfo |
Jump to behavior |
Source: /tmp/na.elf (PID: 6256) |
Reads CPU info from /sys: /sys/devices/system/cpu/online |
Jump to behavior |
Source: /tmp/na.elf (PID: 6239) |
Queries kernel information via 'uname': |
Jump to behavior |
Source: /tmp/na.elf (PID: 6256) |
Queries kernel information via 'uname': |
Jump to behavior |