IOC Report
na.elf

loading gifFilesProcessesURLsDomainsIPsMemdumps321020102Label

Files

File Path
Type
Category
Malicious
Download
na.elf
ELF 32-bit MSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, for GNU/Linux 3.2.0, BuildID[sha1]=bc565f9f2dafc5618defa8eccf705f85712c87da, stripped
initial sample
malicious
/etc/CommId
ASCII text, with no line terminators
dropped
malicious
/usr/sbin/uplugplay
ELF 32-bit MSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, for GNU/Linux 3.2.0, BuildID[sha1]=bc565f9f2dafc5618defa8eccf705f85712c87da, stripped
dropped
malicious
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/proc/6422/task/6423/comm
ASCII text, with no line terminators
dropped
/proc/6422/task/6424/comm
ASCII text, with no line terminators
dropped
/proc/6422/task/6425/comm
ASCII text, with no line terminators
dropped
/usr/lib/systemd/system/uplugplay.service
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep na.elf"
/bin/sh
-
/usr/bin/pgrep
pgrep na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pidof na.elf"
/bin/sh
-
/usr/bin/pidof
pidof na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep uplugplay"
/bin/sh
-
/usr/bin/pgrep
pgrep uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pidof uplugplay"
/bin/sh
-
/usr/bin/pidof
pidof uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pgrep upnpsetup"
/bin/sh
-
/usr/bin/pgrep
pgrep upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "pidof upnpsetup"
/bin/sh
-
/usr/bin/pidof
pidof upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "systemctl daemon-reload"
/bin/sh
-
/usr/bin/systemctl
systemctl daemon-reload
/tmp/na.elf
-
/bin/sh
sh -c "systemctl enable uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl enable uplugplay.service
/tmp/na.elf
-
/bin/sh
sh -c "systemctl start uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl start uplugplay.service
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay
/usr/sbin/uplugplay
-
/usr/sbin/uplugplay
-
/bin/sh
sh -c "/usr/sbin/uplugplay -Dcomsvc"
/bin/sh
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay -Dcomsvc
/usr/sbin/uplugplay
-
/bin/sh
sh -c "nslookup p3.feefreepool.net 8.8.8.8"
/bin/sh
-
/usr/bin/nslookup
nslookup p3.feefreepool.net 8.8.8.8
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.Xk7BFuLzG6 /tmp/tmp.TEiVo2Fi2V /tmp/tmp.rdRU7kSlco
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.Xk7BFuLzG6 /tmp/tmp.TEiVo2Fi2V /tmp/tmp.rdRU7kSlco
There are 46 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rg
unknown
https://bugs.launchpad.net/ubuntu/
unknown
http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi
unknown
http://p3.feefreepool.net/cgi-bin/prometei.cgi
unknown
https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi?r=0&auth=hash&i=%s&enckey=%shttp://%s/cgi-bin/prometei.cgi%m%d%yxinch
unknown
https://http:///:.onion.i2p.zeroGET
unknown
http://dummy.zero/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi?r=0&auth=hash&i=%s&enckey=%s
unknown

Domains

Name
IP
Malicious
p3.feefreepool.net
88.198.246.242

IPs

IP
Domain
Country
Malicious
88.198.246.242
p3.feefreepool.net
Germany
34.249.145.219
unknown
United States
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
7fddad26a000
page read and write
malicious
7fddac4d2000
page execute read
malicious
7fbb64000000
page read and write
55896fb06000
page execute read
7fde2affe000
page execute and read and write
7fde33cee000
page read and write
7fde3274a000
page read and write
7fde265f8000
page execute and read and write
5616710cf000
page execute read
7fde33bc5000
page read and write
7ffcc9c21000
page read and write
7fde28dfd000
page execute and read and write
7fde33696000
page read and write
7fbb6c391000
page read and write
558971dad000
page read and write
7fbb6d0aa000
page read and write
7fde33673000
page read and write
7fbb6ca22000
page read and write
7fde326c8000
page read and write
561673376000
page read and write
5616752a2000
page read and write
7fde33022000
page read and write
7ffe0fd46000
page execute read
7fbb6c641000
page read and write
561671361000
page read and write
7fbb6cd53000
page read and write
7fddac4e7000
page read and write
7fde2c000000
page read and write
55896fd8e000
page read and write
7fde2a600000
page execute and read and write
7fde32687000
page read and write
7fdda8032000
page read and write
56167335f000
page execute and read and write
7fde26df9000
page execute and read and write
7fde33d3b000
page read and write
561671357000
page read and write
7ffe0fc8a000
page read and write
7fde2c021000
page read and write
7fde32646000
page read and write
7fde339e4000
page read and write
7fde332d2000
page read and write
7fde3280c000
page read and write
7fde29dff000
page execute and read and write
7fde33014000
page read and write
7fbb6c383000
page read and write
7fbb6d05d000
page read and write
7fde33cf6000
page read and write
7fde25df7000
page execute and read and write
7fbb6ca05000
page read and write
558972b26000
page read and write
7fdda4062000
page read and write
7fde32709000
page read and write
7fbb6c9e2000
page read and write
55896fd98000
page read and write
558971d96000
page execute and read and write
7fde27dfb000
page execute and read and write
7fbb6d065000
page read and write
7fbb6cf34000
page read and write
7fde336b3000
page read and write
7fde285fc000
page execute and read and write
7fde2a621000
page read and write
7fbae526a000
page read and write
7fbb6bb7b000
page read and write
7fbb64021000
page read and write
7fde2b7ff000
page execute and read and write
7fde295fe000
page execute and read and write
7ffcc9c9a000
page execute read
7fde275fa000
page execute and read and write
There are 58 hidden memdumps, click here to show them.