IOC Report
linux_386.elf

loading gif

Files

File Path
Type
Category
Malicious
linux_386.elf
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, Go BuildID=M2967KDc3JCv7JT3dJNl/UwKSzruSqayTIOWLZXXm/BURNZtNWG7QV-0pWXslf/aajqpRFtYnvbFht06OtE, stripped
initial sample
malicious
/etc/32678
POSIX shell script, ASCII text executable
dropped
malicious
/etc/crontab
ASCII text
dropped
malicious
/etc/init.d/linux_kill
POSIX shell script, ASCII text executable
dropped
malicious
/etc/init.d/ssh
POSIX shell script, ASCII text executable
dropped
malicious
/etc/profile.d/bash_config.sh
a /bin/sh\n/etc/profile.d/bash_config script, ASCII text executable, with no line terminators
dropped
malicious
/.img
a /bin/sh\n/usr/lib/libdlrpcld.so script, ASCII text executable, with no line terminators
dropped
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/proc/5848/loginuid
very short file (no magic)
dropped
/run/crond.pid
ASCII text
dropped
/tmp/#531566 (deleted)
ASCII text
dropped
/usr/lib/systemd/system/linux.service
ASCII text
dropped
/var/log/btmp
data
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
/tmp/linux_386.elf
/tmp/linux_386.elf
/tmp/linux_386.elf
-
/bin/bash
/bin/bash -c /etc/32678&
/bin/bash
-
/etc/32678
/etc/32678
/etc/32678
-
/usr/bin/sleep
sleep 60
/tmp/linux_386.elf
-
/usr/sbin/service
service crond start
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/systemctl
systemctl --quiet is-active multi-user.target
/usr/sbin/service
-
/usr/sbin/service
-
/usr/bin/systemctl
systemctl list-unit-files --full --type=socket
/usr/sbin/service
-
/usr/bin/sed
sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
/usr/bin/systemctl
systemctl start crond.service
/tmp/linux_386.elf
-
/tmp/linux_386.elf
/tmp/linux_386.elf
/tmp/linux_386.elf
-
/usr/sbin/update-rc.d
update-rc.d linux_kill defaults
/usr/sbin/update-rc.d
-
/usr/bin/systemctl
systemctl daemon-reload
/tmp/linux_386.elf
-
/bin/bash
/bin/bash -c "cd /boot;systemctl daemon-reload;systemctl enable linux.service;systemctl start linux.service;journalctl -xe --no-pager"
/bin/bash
-
/usr/bin/systemctl
systemctl daemon-reload
/bin/bash
-
/usr/bin/systemctl
systemctl enable linux.service
/bin/bash
-
/usr/bin/systemctl
systemctl start linux.service
/bin/bash
-
/usr/bin/journalctl
journalctl -xe --no-pager
/tmp/linux_386.elf
-
/bin/bash
/bin/bash -c "cd /boot;ausearch -c 'System.img.conf' --raw | audit2allow -M my-Systemimgconf;semodule -X 300 -i my-Systemimgconf.pp"
/bin/bash
-
/bin/bash
-
/bin/bash
-
/tmp/linux_386.elf
-
/usr/bin/bash
bash -c "echo \"*/1 * * * * root /.img \" >> /etc/crontab"
/tmp/linux_386.elf
-
/usr/bin/renice
renice -20 5424
/tmp/linux_386.elf
-
/usr/bin/mount
mount -o bind /tmp/ /proc/5424
/tmp/linux_386.elf
-
/usr/sbin/service
service cron start
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/systemctl
systemctl --quiet is-active multi-user.target
/usr/sbin/service
-
/usr/sbin/service
-
/usr/bin/systemctl
systemctl list-unit-files --full --type=socket
/usr/sbin/service
-
/usr/bin/sed
sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
/usr/bin/systemctl
systemctl start cron.service
/tmp/linux_386.elf
-
/usr/bin/systemctl
systemctl start crond.service
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/boot/System.img.config
/boot/System.img.config
/boot/System.img.config
-
/usr/bin/pkill
pkill -9 32678
/boot/System.img.config
-
/usr/bin/sh
sh -c /etc/32678&
/usr/bin/sh
-
/etc/32678
/etc/32678
/etc/32678
-
/usr/bin/sleep
sleep 60
/etc/32678
-
/etc/id.services.conf
/etc/id.services.conf
/etc/id.services.conf
-
/usr/bin/pkill
pkill -9 32678
/etc/id.services.conf
-
/usr/bin/sh
sh -c /etc/32678&
/usr/bin/sh
-
/etc/32678
/etc/32678
/etc/32678
-
/usr/bin/sleep
sleep 60
/etc/id.services.conf
-
/usr/sbin/service
service crond start
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/systemctl
systemctl --quiet is-active multi-user.target
/usr/sbin/service
-
/usr/sbin/service
-
/usr/bin/systemctl
systemctl list-unit-files --full --type=socket
/usr/sbin/service
-
/usr/bin/sed
sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
/usr/bin/systemctl
systemctl start crond.service
/etc/id.services.conf
-
/etc/id.services.conf
/etc/id.services.conf
/boot/System.img.config
-
/usr/sbin/service
service crond start
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/systemctl
systemctl --quiet is-active multi-user.target
/usr/sbin/service
-
/usr/sbin/service
-
/usr/bin/systemctl
systemctl list-unit-files --full --type=socket
/usr/sbin/service
-
/usr/bin/sed
sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
/usr/bin/systemctl
systemctl start crond.service
/boot/System.img.config
-
/boot/System.img.config
/boot/System.img.config
/usr/lib/udisks2/udisksd
-
/usr/sbin/dumpe2fs
dumpe2fs -h /dev/dm-0
/usr/lib/systemd/systemd
-
/usr/sbin/cron
/usr/sbin/cron -f
/usr/sbin/cron
-
/usr/sbin/cron
-
/bin/sh
/bin/sh -c "/.img "
/bin/sh
-
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-
/usr/lib/systemd/systemd
-
/usr/sbin/cron
/usr/sbin/cron -f
There are 130 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.baidu.com/search/spider.html)
unknown
http://search.msn.com/msnbot.htm
unknown
http://149.88.76.121:8088/password.txt
149.88.76.121
http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829
unknown
https://www.so.com/s?q=index
unknown
http://help.yahoo.com/help/us/ysearch/slurp)x509:
unknown
http://www.google.com/mobile/adsbot.html)
unknown
http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0
unknown
http://www.baidu.com/search/spider.html)http2:
unknown
http://yandex.com/bots)http:
unknown
http://www.baidu.com/search/spider.html)Mozilla/5.0
unknown
http://www.entireweb.com/about/search_tech/speedy_spider/)text/html
unknown
http://www.haosou.com/help/help_3_2.htmlMozilla/5.0
unknown
https://www.baidu.com/s?wd=insufficient
unknown
http://www.youdao.com/help/webmaster/spider/;)reflect:
unknown
https://search.yahoo.com/search?p=illegal
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
78789.dns.army
149.88.76.121
www.google.com
172.217.16.196

IPs

IP
Domain
Country
Malicious
149.88.76.121
78789.dns.army
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
9800000
page read and write
856d000
page read and write
a000000
page read and write
82df000
page execute read
f7faa000
page read and write
f7f7d000
page read and write
f7fc2000
page read and write
ff808000
page read and write
854a000
page read and write
854a000
page read and write
82df000
page execute read
856d000
page read and write
f7f2c000
page read and write
854a000
page read and write
f7fae000
page execute read
e7d76000
page read and write
e7d8e000
page read and write
e7cd5000
page read and write
854a000
page read and write
a400000
page read and write
ffd82000
page read and write
f7f30000
page execute read
9000000
page read and write
82df000
page execute read
856d000
page read and write
856d000
page read and write
f7fc6000
page execute read
854a000
page read and write
82df000
page execute read
ffc8e000
page read and write
856d000
page read and write
f7f81000
page execute read
e7cf8000
page read and write
a400000
page read and write
f7f0d000
page execute read
ffde9000
page read and write
ffbd0000
page read and write
f7f09000
page read and write
82df000
page execute read
e7d49000
page read and write
There are 30 hidden memdumps, click here to show them.