IOC Report
na.elf

loading gifFilesProcessesURLsDomainsIPsMemdumps321020102Label

Files

File Path
Type
Category
Malicious
Download
na.elf
ELF 32-bit MSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, for GNU/Linux 3.2.0, BuildID[sha1]=bc565f9f2dafc5618defa8eccf705f85712c87da, stripped
initial sample
malicious
/etc/CommId
ASCII text, with no line terminators
dropped
malicious
/usr/sbin/uplugplay
ELF 32-bit MSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, for GNU/Linux 3.2.0, BuildID[sha1]=bc565f9f2dafc5618defa8eccf705f85712c87da, stripped
dropped
malicious
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/proc/6429/task/6430/comm
ASCII text, with no line terminators
dropped
/proc/6429/task/6431/comm
ASCII text, with no line terminators
dropped
/proc/6429/task/6432/comm
ASCII text, with no line terminators
dropped
/usr/lib/systemd/system/uplugplay.service
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep na.elf"
/bin/sh
-
/usr/bin/pgrep
pgrep na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pidof na.elf"
/bin/sh
-
/usr/bin/pidof
pidof na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep uplugplay"
/bin/sh
-
/usr/bin/pgrep
pgrep uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pgrep upnpsetup"
/bin/sh
-
/usr/bin/pgrep
pgrep upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "pidof upnpsetup"
/bin/sh
-
/usr/bin/pidof
pidof upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "systemctl daemon-reload"
/bin/sh
-
/usr/bin/systemctl
systemctl daemon-reload
/tmp/na.elf
-
/bin/sh
sh -c "systemctl enable uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl enable uplugplay.service
/tmp/na.elf
-
/bin/sh
sh -c "systemctl start uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl start uplugplay.service
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.O3o2oGOXJn /tmp/tmp.V9lcRtwRkW /tmp/tmp.OA4qhYcahA
/usr/bin/dash
-
/usr/bin/cat
cat /tmp/tmp.O3o2oGOXJn
/usr/bin/dash
-
/usr/bin/head
head -n 10
/usr/bin/dash
-
/usr/bin/tr
tr -d \\000-\\011\\013\\014\\016-\\037
/usr/bin/dash
-
/usr/bin/cut
cut -c -80
/usr/bin/dash
-
/usr/bin/cat
cat /tmp/tmp.O3o2oGOXJn
/usr/bin/dash
-
/usr/bin/head
head -n 10
/usr/bin/dash
-
/usr/bin/tr
tr -d \\000-\\011\\013\\014\\016-\\037
/usr/bin/dash
-
/usr/bin/cut
cut -c -80
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.O3o2oGOXJn /tmp/tmp.V9lcRtwRkW /tmp/tmp.OA4qhYcahA
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay
/usr/sbin/uplugplay
-
/usr/sbin/uplugplay
-
/bin/sh
sh -c "/usr/sbin/uplugplay -Dcomsvc"
/bin/sh
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay -Dcomsvc
/usr/sbin/uplugplay
-
/bin/sh
sh -c "nslookup p3.feefreepool.net 8.8.8.8"
/bin/sh
-
/usr/bin/nslookup
nslookup p3.feefreepool.net 8.8.8.8
There are 58 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rg
unknown
https://bugs.launchpad.net/ubuntu/
unknown
http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi
unknown
http://p3.feefreepool.net/cgi-bin/prometei.cgi
unknown
https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi?r=0&auth=hash&i=%s&enckey=%shttp://%s/cgi-bin/prometei.cgi%m%d%yxinch
unknown
https://http:///:.onion.i2p.zeroGET
unknown
http://dummy.zero/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi?r=0&auth=hash&i=%s&enckey=%s
unknown

Domains

Name
IP
Malicious
p3.feefreepool.net
88.198.246.242

IPs

IP
Domain
Country
Malicious
88.198.246.242
p3.feefreepool.net
Germany
54.171.230.55
unknown
United States
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
7fa28526a000
page read and write
malicious
7fa2844d2000
page execute read
malicious
7fa300dfd000
page execute and read and write
7fa309fe3000
page read and write
7fa3037ff000
page execute and read and write
7fa302ffe000
page execute and read and write
7f7822e77000
page read and write
7f78234f9000
page read and write
7fa30a682000
page read and write
7fa309615000
page read and write
7fa30a2a1000
page read and write
7fa30acbd000
page read and write
7fa30ab94000
page read and write
7f779d26a000
page read and write
7f781c000000
page read and write
55f51bd15000
page execute read
7f782266f000
page read and write
7fa3005fc000
page execute and read and write
7f78234d6000
page read and write
7fa2ff5fa000
page execute and read and write
7f7823847000
page read and write
7fa30a642000
page read and write
7f7823b59000
page read and write
7f7822e85000
page read and write
7fa304021000
page read and write
55cd9ec8b000
page read and write
7fa280021000
page read and write
55cda0c89000
page execute and read and write
55cd9e9f9000
page execute read
7fa27c079000
page read and write
7fa302621000
page read and write
55cda1e26000
page read and write
7f7823135000
page read and write
7f781c021000
page read and write
55f51dfbc000
page read and write
7f7823b51000
page read and write
7fa2ffdfb000
page execute and read and write
7fa2fedf9000
page execute and read and write
7f7823516000
page read and write
7fa30acc5000
page read and write
55cd9ec81000
page read and write
55f51f38c000
page read and write
7fa309656000
page read and write
7fa3015fe000
page execute and read and write
55f51dfa5000
page execute and read and write
7fa30ad0a000
page read and write
7ffcca48e000
page read and write
55f51bfa7000
page read and write
7f7823a28000
page read and write
7fa30a665000
page read and write
7fa2844e7000
page read and write
7ffd9f1fb000
page execute read
7fa309719000
page read and write
7fa309697000
page read and write
7fa309ff1000
page read and write
7fa3096d8000
page read and write
7fa304000000
page read and write
55f51bf9d000
page read and write
7fa3097db000
page read and write
7f7823b9e000
page read and write
7fa30a9b3000
page read and write
7ffd9f1ef000
page read and write
7fa302600000
page execute and read and write
7fa301dff000
page execute and read and write
55cda0ca0000
page read and write
7ffcca4bb000
page execute read
There are 56 hidden memdumps, click here to show them.