IOC Report
na.elf

loading gif

Files

File Path
Type
Category
Malicious
na.elf
ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, with debug_info, not stripped
initial sample
malicious
/etc/systemd/system/sbolo.service
ASCII text
dropped
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/tmp/qemu-open.rzupep (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/tmp/na.elf
-
/bin/sh
/bin/sh -c "systemctl enable sbolo.service > /dev/null 2>&1"
/bin/sh
-
/usr/bin/systemctl
systemctl enable sbolo.service
/tmp/na.elf
-
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator

URLs

Name
IP
Malicious
http://91.200.103.117/%s
unknown
http://91.200.103.117/bolubotnetarm7
unknown

Domains

Name
IP
Malicious
yi0key.heleh.com.vn
91.200.103.117
malicious

IPs

IP
Domain
Country
Malicious
91.200.103.117
yi0key.heleh.com.vn
Germany
malicious
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7f2a3c02f000
page execute read
malicious
7f2b42cba000
page read and write
7f2b42958000
page read and write
7f2b43296000
page read and write
7f2b428c6000
page read and write
7ffd404ef000
page read and write
7f2b43609000
page read and write
7ffd405d6000
page execute read
7f2a3c037000
page read and write
7f2b420be000
page read and write
559cacc32000
page read and write
7f2b42f25000
page read and write
7f2b430b4000
page read and write
7f2b43477000
page read and write
7f2b435a0000
page read and write
7f2b3bfff000
page read and write
559caa9c3000
page execute read
559caac14000
page read and write
7f2b3c021000
page read and write
7f2a3c040000
page read and write
559cacc1b000
page execute and read and write
7f2b435c4000
page read and write
559caac1d000
page read and write
7f2b42f48000
page read and write
559cad892000
page read and write
There are 15 hidden memdumps, click here to show them.