Linux
Analysis Report
na.elf
Overview
General Information
Sample name: | na.elf |
Analysis ID: | 1645437 |
MD5: | 4e5e62490e48645aa75802ae68893e29 |
SHA1: | 6807f48c4394ed84c6e8cef24f04c49e9c39bfb9 |
SHA256: | 971c16e26a25cf01121168a7056635d00865a46bfa26271f5ff5168d12587f84 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 92 |
Range: | 0 - 100 |
Signatures
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1645437 |
Start date and time: | 2025-03-21 18:57:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | na.elf |
Detection: | MAL |
Classification: | mal92.troj.evad.linELF@0/8@2/0 |
Command: | /tmp/na.elf |
PID: | 6224 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | Starting... System install...OK |
Standard Error: | Created symlink /etc/systemd/system/multi-user.target.wants/uplugplay.service /lib/systemd/system/uplugplay.service. |
- system is lnxubuntu20
- na.elf New Fork (PID: 6228, Parent: 6224)
- sh New Fork (PID: 6234, Parent: 6228)
- na.elf New Fork (PID: 6237, Parent: 6224)
- sh New Fork (PID: 6239, Parent: 6237)
- na.elf New Fork (PID: 6242, Parent: 6224)
- sh New Fork (PID: 6244, Parent: 6242)
- na.elf New Fork (PID: 6249, Parent: 6224)
- sh New Fork (PID: 6251, Parent: 6249)
- na.elf New Fork (PID: 6254, Parent: 6224)
- sh New Fork (PID: 6256, Parent: 6254)
- na.elf New Fork (PID: 6259, Parent: 6224)
- sh New Fork (PID: 6265, Parent: 6259)
- na.elf New Fork (PID: 6268, Parent: 6224)
- sh New Fork (PID: 6270, Parent: 6268)
- na.elf New Fork (PID: 6285, Parent: 6224)
- sh New Fork (PID: 6287, Parent: 6285)
- na.elf New Fork (PID: 6293, Parent: 6224)
- sh New Fork (PID: 6295, Parent: 6293)
- systemd New Fork (PID: 6272, Parent: 6271)
- systemd New Fork (PID: 6291, Parent: 6290)
- systemd New Fork (PID: 6296, Parent: 1)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Prometei | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Prometei | Yara detected Prometei | Joe Security | ||
JoeSecurity_Prometei_1 | Yara detected Prometei | Joe Security | ||
APT38_LDACLS_78736_45 | Detects APT38-Lazarus Linux DACLS | Emanuele De Lucia |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Prometei | Yara detected Prometei | Joe Security | ||
JoeSecurity_Prometei_1 | Yara detected Prometei | Joe Security | ||
APT38_LDACLS_78736_45 | Detects APT38-Lazarus Linux DACLS | Emanuele De Lucia |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Prometei | Yara detected Prometei | Joe Security | ||
JoeSecurity_Prometei_1 | Yara detected Prometei | Joe Security | ||
APT38_LDACLS_78736_45 | Detects APT38-Lazarus Linux DACLS | Emanuele De Lucia |
| |
JoeSecurity_Prometei | Yara detected Prometei | Joe Security | ||
JoeSecurity_Prometei_1 | Yara detected Prometei | Joe Security | ||
Click to see the 2 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-21T19:00:12.008761+0100 | 2044561 | 1 | Domain Observed Used for C2 Detected | 192.168.2.23 | 44761 | 8.8.8.8 | 53 | UDP |
2025-03-21T19:00:12.131374+0100 | 2044561 | 1 | Domain Observed Used for C2 Detected | 192.168.2.23 | 44334 | 8.8.8.8 | 53 | UDP |
- • AV Detection
- • Bitcoin Miner
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Bitcoin Miner |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Socket: | Jump to behavior |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: | ||
Source: | Potential command found: |
Source: | .symtab present: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Pgrep executable: | Jump to behavior | ||
Source: | Pgrep executable: | Jump to behavior | ||
Source: | Pgrep executable: | Jump to behavior |
Source: | Systemctl executable: | Jump to behavior | ||
Source: | Systemctl executable: | Jump to behavior | ||
Source: | Systemctl executable: | Jump to behavior |
Source: | Reads from proc file: | Jump to behavior |
Source: | File: | Jump to behavior |
Source: | File written: | Jump to dropped file |
Source: | Stderr: Created symlink /etc/systemd/system/multi-user.target.wants/uplugplay.service /lib/systemd/system/uplugplay.service.: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to dropped file |
Source: | File: | Jump to behavior |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 1 Command and Scripting Interpreter | 1 Systemd Service | 1 Systemd Service | 1 Masquerading | 1 OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Scripting | Boot or Logon Initialization Scripts | 1 File and Directory Permissions Modification | LSASS Memory | 2 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Hidden Files and Directories | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 File Deletion | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Proxy | Traffic Duplication | Data Destruction |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Linux.Trojan.Prometei |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Linux.Trojan.Prometei |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
p3.feefreepool.net | 88.198.246.242 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
88.198.246.242 | p3.feefreepool.net | Germany | 24940 | HETZNER-ASDE | false | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
88.198.246.242 | Get hash | malicious | Prometei | Browse |
| |
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
91.189.91.43 | Get hash | malicious | Prometei | Browse | ||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Tsunami | Browse | |||
Get hash | malicious | Poseidon | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
p3.feefreepool.net | Get hash | malicious | Prometei | Browse |
| |
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HETZNER-ASDE | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
CANONICAL-ASGB | Get hash | malicious | Prometei | Browse |
| |
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Tsunami | Browse |
| ||
CANONICAL-ASGB | Get hash | malicious | Prometei | Browse |
| |
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Tsunami | Browse |
| ||
INIT7CH | Get hash | malicious | Prometei | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Tsunami | Browse |
|
Process: | /usr/sbin/uplugplay |
File Type: | |
Category: | dropped |
Size (bytes): | 16 |
Entropy (8bit): | 3.75 |
Encrypted: | false |
SSDEEP: | 3:eStw:eSu |
MD5: | 598187B4359036CFAA974E0A7AF21FC7 |
SHA1: | 687AC0035CA90EB05FBB7FF555DB2B226B364988 |
SHA-256: | F9F43C7784EB33D1E67303B53759C612E8AF48CA27F8C4780C47AD0311A64AF6 |
SHA-512: | 87ABEA4AED2DA4C561BEF484529774E3A13B864CF40ECEBB62EA67B2A579FB9631F2751E790E4C5AC4EF95B9D0E97F1163B4EEB09DE52CE87F72D30C5E16B06E |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File Type: | |
Category: | dropped |
Size (bytes): | 76 |
Entropy (8bit): | 3.7627880354948586 |
Encrypted: | false |
SSDEEP: | 3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb |
MD5: | D86A1F5765F37989EB0EC3837AD13ECC |
SHA1: | D749672A734D9DEAFD61DCA501C6929EC431B83E |
SHA-256: | 85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45 |
SHA-512: | 338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | /usr/bin/nslookup |
File Type: | |
Category: | dropped |
Size (bytes): | 14 |
Entropy (8bit): | 3.09306920777189 |
Encrypted: | false |
SSDEEP: | 3:XfSPyVd:PSPS |
MD5: | 171B43AA1C3C4E2911DCF0588717BBD3 |
SHA1: | 8930ABB6E041171C126D088ED50258FBCD48D411 |
SHA-256: | CE62A8EED2C1DC6198C6839B9FDB246B3B27B6B9FABEDEEF9A29F9A9693552F6 |
SHA-512: | ABE880D53ED7383EEBE48C15B9AD657755DCFFE821DB305DE2F0F7AA0C664BB427C2F4DAE5DF151AE594FBBB14468B20B60F91C0D54A0CADF6FBCF8652B1931F |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | /usr/bin/nslookup |
File Type: | |
Category: | dropped |
Size (bytes): | 9 |
Entropy (8bit): | 2.94770277922009 |
Encrypted: | false |
SSDEEP: | 3:XfRJy:P2 |
MD5: | 2F82B657C9233B1E2788BD70DE21FA20 |
SHA1: | 8F7E0D39A7F038E960CDC02842E687A5C634D75C |
SHA-256: | 99D170CE8EA976FB905E9DB9668812B96525088B0C1FE44E4B7FCC13DCD32B59 |
SHA-512: | 85D75FE21132BA7A6190A983C7638CA09D697D3AA01EB9F65C5205B1CF1DA2F114134E13CD54DEB4E60E6B1FBB9800379CCC7BF993998CB071DDECE9F70C2F5F |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | /usr/bin/nslookup |
File Type: | |
Category: | dropped |
Size (bytes): | 12 |
Entropy (8bit): | 3.084962500721156 |
Encrypted: | false |
SSDEEP: | 3:XfWdvRo:PWno |
MD5: | C22618C8DBDAE363A43A752F91B7721F |
SHA1: | 7D810E973A23C47391A2EBA0B0A97BC11828EA41 |
SHA-256: | EF4893681CD2DB8434E2E6275E09CDEFF8BAF08090B54BA7DDA1839AC830A985 |
SHA-512: | AB094143772DA19862744D60A3A62CE9ED2E07E70F888F66DAE7EC3A76F3EDA3611E4338B6A6D7D08E15CE53C49DDBE14850E2A277F8D586AD6D323E492152CB |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | /tmp/na.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 145 |
Entropy (8bit): | 4.769509838572339 |
Encrypted: | false |
SSDEEP: | 3:zMZa75X1PxQJqtWA1+DRvBADMikAdIgQ+aQmNJX4ev+sirSkQmWA1+DRvn:z8uXcqtWA4RZAMD+aBNdhTILQmWA4Rv |
MD5: | 8CA62D1F47880BCE036C2956C9B7B272 |
SHA1: | 3BCC3A5C4FCC5B0D08C4524A59F6B8E113B62060 |
SHA-256: | C655D3D4E374FAD38313EC4262207B2D7D68A870238F203EF3C33F85E66C8E32 |
SHA-512: | 4CD2D9D67151FA25E833707DEE2442C4A5F752053FC2C36EC73C0E2B734C66CA69C63FCEB47714D9ADD5B9FE2EEE1E45BE5199E2CAE7C26173E766B333877DA6 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | /tmp/na.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 920568 |
Entropy (8bit): | 5.7652816704783065 |
Encrypted: | false |
SSDEEP: | 12288:qb143S0q+8eXS1/f2Wc3slC3yjTjMv+9XSJhBXEsV3b9gh4J8zMSv7MzOup8Mpl4:qmShf4OTjMgXSJhBXEsVrmz9MOup1Khb |
MD5: | 4E5E62490E48645AA75802AE68893E29 |
SHA1: | 6807F48C4394ED84C6E8CEF24F04C49E9C39BFB9 |
SHA-256: | 971C16E26A25CF01121168A7056635D00865A46BFA26271F5FF5168D12587F84 |
SHA-512: | C39C2AD57131FD00344970A28A8F0C380E7A925D3369D7F4C5E50545CD84D3997684A61FDFEFF3A7D21E7A4BD0567A398E33B18817CACA478C8AA4614C25563F |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
File type: | |
Entropy (8bit): | 5.7652816704783065 |
TrID: |
|
File name: | na.elf |
File size: | 920'568 bytes |
MD5: | 4e5e62490e48645aa75802ae68893e29 |
SHA1: | 6807f48c4394ed84c6e8cef24f04c49e9c39bfb9 |
SHA256: | 971c16e26a25cf01121168a7056635d00865a46bfa26271f5ff5168d12587f84 |
SHA512: | c39c2ad57131fd00344970a28a8f0c380e7a925d3369d7f4c5e50545cd84d3997684a61fdfeff3a7d21e7a4bd0567a398e33b18817caca478c8aa4614c25563f |
SSDEEP: | 12288:qb143S0q+8eXS1/f2Wc3slC3yjTjMv+9XSJhBXEsV3b9gh4J8zMSv7MzOup8Mpl4:qmShf4OTjMgXSJhBXEsVrmz9MOup1Khb |
TLSH: | 07155B653700EF5EF39DE27108F287E046D125F31AD24296A278C71C6EE161D28AFDE9 |
File Content Preview: | .ELF.....................@.....4....p....4. ...(.#."p......X.@.X.@.X................p......p.@.p.@.p.........................@...@........................&..N&..N&...F...V................4.@.4.@.4... ... .................@...@.....$...$..............'..N' |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 8 |
Section Header Offset: | 918948 |
Section Header Size: | 40 |
Number of Section Headers: | 35 |
Header String Table Index: | 34 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.note.ABI-tag | NOTE | 0x400134 | 0x134 | 0x20 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.MIPS.abiflags | MIPS_ABIFLAGS | 0x400158 | 0x158 | 0x18 | 0x18 | 0x2 | A | 0 | 0 | 8 |
.reginfo | MIPS_REGINFO | 0x400170 | 0x170 | 0x18 | 0x18 | 0x2 | A | 0 | 0 | 4 |
.note.gnu.build-id | NOTE | 0x400188 | 0x188 | 0x24 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.rel.dyn | REL | 0x4001ac | 0x1ac | 0x170 | 0x8 | 0x2 | A | 0 | 0 | 4 |
.init | PROGBITS | 0x40031c | 0x31c | 0x7c | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x4003a0 | 0x3a0 | 0xb4f30 | 0x0 | 0x6 | AX | 0 | 0 | 16 |
__libc_freeres_fn | PROGBITS | 0x4b52d0 | 0xb52d0 | 0x11fc | 0x0 | 0x6 | AX | 0 | 0 | 4 |
__libc_thread_freeres_fn | PROGBITS | 0x4b64cc | 0xb64cc | 0x2dc | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.fini | PROGBITS | 0x4b67a8 | 0xb67a8 | 0x44 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x4b67f0 | 0xb67f0 | 0x172a0 | 0x0 | 0x2 | A | 0 | 0 | 16 |
.eh_frame | PROGBITS | 0x4cda90 | 0xcda90 | 0x3d1c | 0x0 | 0x2 | A | 0 | 0 | 4 |
.gcc_except_table | PROGBITS | 0x4e26c8 | 0xd26c8 | 0x108 | 0x0 | 0x3 | WA | 0 | 0 | 1 |
.tdata | PROGBITS | 0x4e27d0 | 0xd27d0 | 0x14 | 0x0 | 0x403 | WAT | 0 | 0 | 4 |
.tbss | NOBITS | 0x4e27e4 | 0xd27e4 | 0x38 | 0x0 | 0x403 | WAT | 0 | 0 | 4 |
.fini_array | FINI_ARRAY | 0x4e27e4 | 0xd27e4 | 0x4 | 0x4 | 0x3 | WA | 0 | 0 | 4 |
.ctors | PROGBITS | 0x4e27e8 | 0xd27e8 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x4e27f0 | 0xd27f0 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data.rel.ro | PROGBITS | 0x4e27f8 | 0xd27f8 | 0x2808 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.data | PROGBITS | 0x4e5000 | 0xd5000 | 0x1300 | 0x0 | 0x3 | WA | 0 | 0 | 16 |
__libc_subfreeres | PROGBITS | 0x4e6300 | 0xd6300 | 0x40 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
__libc_IO_vtables | PROGBITS | 0x4e6340 | 0xd6340 | 0x348 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
__libc_atexit | PROGBITS | 0x4e6688 | 0xd6688 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
__libc_thread_subfreeres | PROGBITS | 0x4e668c | 0xd668c | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.got | PROGBITS | 0x4e66a0 | 0xd66a0 | 0x6b0 | 0x4 | 0x10000003 | WAp | 0 | 0 | 16 |
.sdata | PROGBITS | 0x4e6d50 | 0xd6d50 | 0x4 | 0x0 | 0x10000003 | WAp | 0 | 0 | 4 |
.sbss | NOBITS | 0x4e6d58 | 0xd6d54 | 0x120 | 0x0 | 0x10000003 | WAp | 0 | 0 | 8 |
.bss | NOBITS | 0x4e6e80 | 0xd6d54 | 0xd60f20 | 0x0 | 0x3 | WA | 0 | 0 | 16 |
__libc_freeres_ptrs | NOBITS | 0x1247da0 | 0xd6d54 | 0x1c | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.comment | PROGBITS | 0x0 | 0xd6d54 | 0x53 | 0x1 | 0x30 | MS | 0 | 0 | 1 |
.pdr | PROGBITS | 0x0 | 0xd6da8 | 0x9660 | 0x0 | 0x0 | 0 | 0 | 4 | |
.gnu.attributes | GNU_ATTRIBUTES | 0x0 | 0xe0408 | 0x10 | 0x0 | 0x0 | 0 | 0 | 1 | |
.mdebug.abi32 | PROGBITS | 0x0 | 0xe0418 | 0x0 | 0x0 | 0x0 | 0 | 0 | 1 | |
.shstrtab | STRTAB | 0x0 | 0xe0418 | 0x18a | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
ABIFLAGS | 0x158 | 0x400158 | 0x400158 | 0x18 | 0x18 | 1.1387 | 0x4 | R | 0x8 | .MIPS.abiflags | |
<unknown> | 0x170 | 0x400170 | 0x400170 | 0x18 | 0x18 | 1.4575 | 0x4 | R | 0x4 | .reginfo | |
LOAD | 0x0 | 0x400000 | 0x400000 | 0xd17ac | 0xd17ac | 5.9058 | 0x5 | R E | 0x10000 | .note.ABI-tag .MIPS.abiflags .reginfo .note.gnu.build-id .rel.dyn .init .text __libc_freeres_fn __libc_thread_freeres_fn .fini .rodata .eh_frame | |
LOAD | 0xd26c8 | 0x4e26c8 | 0x4e26c8 | 0x468c | 0xd656f4 | 3.3797 | 0x6 | RW | 0x10000 | .gcc_except_table .tdata .tbss .fini_array .ctors .dtors .data.rel.ro .data __libc_subfreeres __libc_IO_vtables __libc_atexit __libc_thread_subfreeres .got .sdata .sbss .bss __libc_freeres_ptrs | |
NOTE | 0x134 | 0x400134 | 0x400134 | 0x20 | 0x20 | 1.5613 | 0x4 | R | 0x4 | .note.ABI-tag | |
NOTE | 0x188 | 0x400188 | 0x400188 | 0x24 | 0x24 | 4.1916 | 0x4 | R | 0x4 | .note.gnu.build-id | |
TLS | 0xd27d0 | 0x4e27d0 | 0x4e27d0 | 0x14 | 0x4c | 2.6610 | 0x4 | R | 0x4 | .tdata .tbss | |
GNU_RELRO | 0xd26c8 | 0x4e26c8 | 0x4e26c8 | 0x2938 | 0x2938 | 3.0456 | 0x4 | R | 0x1 | .gcc_except_table .tdata .tbss .fini_array .ctors .dtors .data.rel.ro |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-21T19:00:12.008761+0100 | 2044561 | ET MALWARE Prometei Botnet CnC Domain (feefreepool .net) in DNS Lookup | 1 | 192.168.2.23 | 44761 | 8.8.8.8 | 53 | UDP |
2025-03-21T19:00:12.131374+0100 | 2044561 | ET MALWARE Prometei Botnet CnC Domain (feefreepool .net) in DNS Lookup | 1 | 192.168.2.23 | 44334 | 8.8.8.8 | 53 | UDP |
- Total Packets: 13
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 21, 2025 18:57:53.025722027 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Mar 21, 2025 18:57:58.404658079 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Mar 21, 2025 18:57:59.936646938 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Mar 21, 2025 18:58:12.990813971 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Mar 21, 2025 18:58:25.277244091 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Mar 21, 2025 18:58:29.372661114 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Mar 21, 2025 18:58:53.945198059 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Mar 21, 2025 19:00:12.269123077 CET | 56830 | 80 | 192.168.2.23 | 88.198.246.242 |
Mar 21, 2025 19:00:13.293988943 CET | 56830 | 80 | 192.168.2.23 | 88.198.246.242 |
Mar 21, 2025 19:00:15.309849977 CET | 56830 | 80 | 192.168.2.23 | 88.198.246.242 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 21, 2025 18:58:11.718578100 CET | 46941 | 53 | 192.168.2.23 | 8.8.8.8 |
Mar 21, 2025 19:00:12.008760929 CET | 44761 | 53 | 192.168.2.23 | 8.8.8.8 |
Mar 21, 2025 19:00:12.124744892 CET | 53 | 44761 | 8.8.8.8 | 192.168.2.23 |
Mar 21, 2025 19:00:12.131373882 CET | 44334 | 53 | 192.168.2.23 | 8.8.8.8 |
Mar 21, 2025 19:00:12.246237993 CET | 53 | 44334 | 8.8.8.8 | 192.168.2.23 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 21, 2025 19:00:12.008760929 CET | 192.168.2.23 | 8.8.8.8 | 0x1c19 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 21, 2025 19:00:12.131373882 CET | 192.168.2.23 | 8.8.8.8 | 0x3982 | Standard query (0) | 28 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 21, 2025 19:00:12.124744892 CET | 8.8.8.8 | 192.168.2.23 | 0x1c19 | No error (0) | 88.198.246.242 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 17:57:53 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | /tmp/na.elf |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:57:53 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:57:53 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "pgrep na.elf" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:53 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:53 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/pgrep |
Arguments: | pgrep na.elf |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 17:57:54 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:57:54 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "pidof na.elf" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:54 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:54 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/pidof |
Arguments: | pidof na.elf |
File size: | 27016 bytes |
MD5 hash: | f58f67968fc50f1497f9ea9e9c22b6e8 |
Start time (UTC): | 17:57:56 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:57:56 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "pgrep uplugplay" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:56 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:56 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/pgrep |
Arguments: | pgrep uplugplay |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 17:57:57 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:57:57 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "pidof uplugplay" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:57 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:57 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/pidof |
Arguments: | pidof uplugplay |
File size: | 27016 bytes |
MD5 hash: | f58f67968fc50f1497f9ea9e9c22b6e8 |
Start time (UTC): | 17:57:59 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:57:59 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "pgrep upnpsetup" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:59 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:57:59 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/pgrep |
Arguments: | pgrep upnpsetup |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 17:58:00 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:58:00 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "pidof upnpsetup" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:00 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:00 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/pidof |
Arguments: | pidof upnpsetup |
File size: | 27016 bytes |
MD5 hash: | f58f67968fc50f1497f9ea9e9c22b6e8 |
Start time (UTC): | 17:58:04 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:58:04 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl daemon-reload" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:04 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:04 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/systemctl |
Arguments: | systemctl daemon-reload |
File size: | 996584 bytes |
MD5 hash: | 4deddfb6741481f68aeac522cc26ff4b |
Start time (UTC): | 17:58:05 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:58:05 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl enable uplugplay.service" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:05 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:05 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/systemctl |
Arguments: | systemctl enable uplugplay.service |
File size: | 996584 bytes |
MD5 hash: | 4deddfb6741481f68aeac522cc26ff4b |
Start time (UTC): | 17:58:07 |
Start date (UTC): | 21/03/2025 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:58:07 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl start uplugplay.service" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:07 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:07 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/systemctl |
Arguments: | systemctl start uplugplay.service |
File size: | 996584 bytes |
MD5 hash: | 4deddfb6741481f68aeac522cc26ff4b |
Start time (UTC): | 17:58:05 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 17:58:05 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
Arguments: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File size: | 22760 bytes |
MD5 hash: | 3633b075f40283ec938a2a6a89671b0e |
Start time (UTC): | 17:58:07 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 17:58:07 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
Arguments: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File size: | 22760 bytes |
MD5 hash: | 3633b075f40283ec938a2a6a89671b0e |
Start time (UTC): | 17:58:08 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 17:58:08 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/sbin/uplugplay |
Arguments: | /usr/sbin/uplugplay |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:58:08 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/sbin/uplugplay |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:58:09 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/sbin/uplugplay |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 17:58:09 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "/usr/sbin/uplugplay -Dcomsvc" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:09 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 17:58:09 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/sbin/uplugplay |
Arguments: | /usr/sbin/uplugplay -Dcomsvc |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 18:00:10 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/sbin/uplugplay |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 18:00:11 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | sh -c "nslookup p3.feefreepool.net 8.8.8.8" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:00:11 |
Start date (UTC): | 21/03/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:00:11 |
Start date (UTC): | 21/03/2025 |
Path: | /usr/bin/nslookup |
Arguments: | nslookup p3.feefreepool.net 8.8.8.8 |
File size: | 109360 bytes |
MD5 hash: | 120a37373c108c9c12e3d40ae6d4c5c7 |