IOC Report
na.elf

loading gifFilesProcessesURLsDomainsIPsMemdumps321020102Label

Files

File Path
Type
Category
Malicious
Download
na.elf
ELF 32-bit MSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, for GNU/Linux 3.2.0, BuildID[sha1]=bc565f9f2dafc5618defa8eccf705f85712c87da, stripped
initial sample
malicious
/etc/CommId
ASCII text, with no line terminators
dropped
malicious
/usr/sbin/uplugplay
ELF 32-bit MSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, for GNU/Linux 3.2.0, BuildID[sha1]=bc565f9f2dafc5618defa8eccf705f85712c87da, stripped
dropped
malicious
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/proc/6426/task/6427/comm
ASCII text, with no line terminators
dropped
/proc/6426/task/6428/comm
ASCII text, with no line terminators
dropped
/proc/6426/task/6429/comm
ASCII text, with no line terminators
dropped
/usr/lib/systemd/system/uplugplay.service
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.HpJHoQUThj /tmp/tmp.ni3tTpWfD7 /tmp/tmp.Z8EGCKutvm
/usr/bin/dash
-
/usr/bin/cat
cat /tmp/tmp.HpJHoQUThj
/usr/bin/dash
-
/usr/bin/head
head -n 10
/usr/bin/dash
-
/usr/bin/tr
tr -d \\000-\\011\\013\\014\\016-\\037
/usr/bin/dash
-
/usr/bin/cut
cut -c -80
/usr/bin/dash
-
/usr/bin/cat
cat /tmp/tmp.HpJHoQUThj
/usr/bin/dash
-
/usr/bin/head
head -n 10
/usr/bin/dash
-
/usr/bin/tr
tr -d \\000-\\011\\013\\014\\016-\\037
/usr/bin/dash
-
/usr/bin/cut
cut -c -80
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.HpJHoQUThj /tmp/tmp.ni3tTpWfD7 /tmp/tmp.Z8EGCKutvm
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep na.elf"
/bin/sh
-
/usr/bin/pgrep
pgrep na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pidof na.elf"
/bin/sh
-
/usr/bin/pidof
pidof na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep uplugplay"
/bin/sh
-
/usr/bin/pgrep
pgrep uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pidof uplugplay"
/bin/sh
-
/usr/bin/pidof
pidof uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pgrep upnpsetup"
/bin/sh
-
/usr/bin/pgrep
pgrep upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "pidof upnpsetup"
/bin/sh
-
/usr/bin/pidof
pidof upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "systemctl daemon-reload"
/bin/sh
-
/usr/bin/systemctl
systemctl daemon-reload
/tmp/na.elf
-
/bin/sh
sh -c "systemctl enable uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl enable uplugplay.service
/tmp/na.elf
-
/bin/sh
sh -c "systemctl start uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl start uplugplay.service
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay
/usr/sbin/uplugplay
-
/usr/sbin/uplugplay
-
/bin/sh
sh -c "/usr/sbin/uplugplay -Dcomsvc"
/bin/sh
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay -Dcomsvc
/usr/sbin/uplugplay
-
/bin/sh
sh -c "nslookup p3.feefreepool.net 8.8.8.8"
/bin/sh
-
/usr/bin/nslookup
nslookup p3.feefreepool.net 8.8.8.8
There are 62 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rg
unknown
https://bugs.launchpad.net/ubuntu/
unknown
http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi
unknown
http://p3.feefreepool.net/cgi-bin/prometei.cgi
unknown
https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi?r=0&auth=hash&i=%s&enckey=%shttp://%s/cgi-bin/prometei.cgi%m%d%yxinch
unknown
https://http:///:.onion.i2p.zeroGET
unknown
http://dummy.zero/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi?r=0&auth=hash&i=%s&enckey=%s
unknown

Domains

Name
IP
Malicious
p3.feefreepool.net
88.198.246.242

IPs

IP
Domain
Country
Malicious
88.198.246.242
p3.feefreepool.net
Germany
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
7ff69526a000
page read and write
malicious
7ff6944d2000
page execute read
malicious
7ffd31e48000
page read and write
55e4f7965000
page read and write
7ff70fdfb000
page execute and read and write
559e355c3000
page read and write
7fe230b23000
page read and write
7ff719ac5000
page read and write
7fe2305d1000
page read and write
559e375c1000
page execute and read and write
55e4f5946000
page read and write
7ff712ffe000
page execute and read and write
7fe230942000
page read and write
7ff71af40000
page read and write
7ff68c062000
page read and write
7ff712621000
page read and write
7fe22ff80000
page read and write
7ff7115fe000
page execute and read and write
7ff719b87000
page read and write
7fe230230000
page read and write
7ff71aa11000
page read and write
7fe1a926a000
page read and write
7fe228021000
page read and write
55e4f56be000
page execute read
7fe2305f4000
page read and write
559e375d8000
page read and write
559e355b9000
page read and write
7ff719a43000
page read and write
7ffda7b79000
page read and write
7ff711dff000
page execute and read and write
7ff71b071000
page read and write
7ffd31f0e000
page execute read
7ff71a9ee000
page read and write
7ffda7b8c000
page execute read
7ff719a02000
page read and write
7ff71aa2e000
page read and write
7fe22ff72000
page read and write
7ff7137ff000
page execute and read and write
7ff71a39d000
page read and write
7ff71b069000
page read and write
559e379e5000
page read and write
55e4f956e000
page read and write
7ff7199c1000
page read and write
559e35331000
page execute read
7fe228000000
page read and write
7ff70edf9000
page execute and read and write
7ff71ad5f000
page read and write
7fe230c54000
page read and write
7ff714000000
page read and write
55e4f5950000
page read and write
7fe230c99000
page read and write
7ff71a38f000
page read and write
7ff7105fc000
page execute and read and write
7ff71a64d000
page read and write
7ff6944e7000
page read and write
7ff712600000
page execute and read and write
7ff70ddf7000
page execute and read and write
7fe230611000
page read and write
7ff714021000
page read and write
55e4f794e000
page execute and read and write
7ff70e5f8000
page execute and read and write
7fe230c4c000
page read and write
7fe22f76a000
page read and write
7ff710dfd000
page execute and read and write
7ff719a84000
page read and write
7ff70f5fa000
page execute and read and write
7ff690032000
page read and write
7ff71b0b6000
page read and write
There are 58 hidden memdumps, click here to show them.