IOC Report
na.elf

loading gif

Files

File Path
Type
Category
Malicious
na.elf
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/etc/systemd/system/sbolo.service
ASCII text
dropped
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/tmp/qemu-open.iX82IG (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/tmp/na.elf
-
/bin/sh
sh -c "systemctl enable sbolo.service > /dev/null 2>&1"
/bin/sh
-
/usr/bin/systemctl
systemctl enable sbolo.service
/tmp/na.elf
-
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator

URLs

Name
IP
Malicious
http://91.200.103.117/bolubotnetsh4
unknown
http://91.200.103.117/%s
unknown

Domains

Name
IP
Malicious
yi0key.heleh.com.vn
91.200.103.117
malicious
daisy.ubuntu.com
162.213.35.25

IPs

IP
Domain
Country
Malicious
91.200.103.117
yi0key.heleh.com.vn
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7f1a6041a000
page execute read
malicious
7f1ae0000000
page read and write
7f1a6042f000
page read and write
7ffe1c6ff000
page read and write
7ffe1c71b000
page execute read
7f1ae70fc000
page read and write
5636b2740000
page read and write
5636b1eb7000
page read and write
7f1ae0021000
page read and write
5636afc84000
page execute read
7f1ae5f2a000
page read and write
7f1ae672d000
page read and write
5636afea2000
page read and write
7f1ae7272000
page read and write
7f1ae673b000
page read and write
7f1ae69ca000
page read and write
7f1ae6db1000
page read and write
7f1ae722d000
page read and write
5636b1ea0000
page execute and read and write
7f1a6043a000
page read and write
5636afe9a000
page read and write
7f1ae7225000
page read and write
7f1ae6d8c000
page read and write
There are 13 hidden memdumps, click here to show them.