Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1528819
MD5:5ea3839ef4effebf0c57e18742d1d284
SHA1:a8a3949d509f75217c347dda38c42f1ab53156fc
SHA256:64d671e954c370655d61855ba22381f9bbd929ac713322765686619cebeac480
Tags:elfuser-abuse_ch
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes itself again with its parent PID as an argument (indicative of hampering debugging)
Executes the "iptables" command to insert, remove and/or manipulate rules
Opens /proc/net/* files useful for finding connected devices and routers
Sample deletes itself
Creates hidden files and/or directories
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528819
Start date and time:2024-10-08 11:22:38 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 10s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal72.spre.evad.linELF@0/2@58/0
  • Excluded IPs from analysis (whitelisted): 94.130.35.4, 51.75.67.47, 116.203.96.227, 5.189.151.39
  • Excluded domains from analysis (whitelisted): pool.ntp.org
Command:/tmp/na.elf
PID:5551
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:iptables v1.8.4 (legacy): Couldn't load target `CWMP_CR':No such file or directory

Try `iptables -h' or 'iptables --help' for more information.
iptables: No chain/target/match by that name.
  • system is lnxubuntu20
  • na.elf (PID: 5551, Parent: 5469, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5553, Parent: 5551)
      • na.elf New Fork (PID: 5555, Parent: 5553)
        • na.elf New Fork (PID: 5559, Parent: 5555)
        • sh (PID: 5559, Parent: 5555, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
          • sh New Fork (PID: 5565, Parent: 5559)
          • iptables (PID: 5565, Parent: 5559, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 23 -j DROP
        • na.elf New Fork (PID: 5571, Parent: 5555)
        • sh (PID: 5571, Parent: 5555, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
          • sh New Fork (PID: 5576, Parent: 5571)
          • iptables (PID: 5576, Parent: 5571, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 7547 -j DROP
        • na.elf New Fork (PID: 5577, Parent: 5555)
        • sh (PID: 5577, Parent: 5555, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
          • sh New Fork (PID: 5582, Parent: 5577)
          • iptables (PID: 5582, Parent: 5577, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 5555 -j DROP
        • na.elf New Fork (PID: 5583, Parent: 5555)
        • sh (PID: 5583, Parent: 5555, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
          • sh New Fork (PID: 5588, Parent: 5583)
          • iptables (PID: 5588, Parent: 5583, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 5358 -j DROP
        • na.elf New Fork (PID: 5589, Parent: 5555)
        • sh (PID: 5589, Parent: 5555, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -D INPUT -j CWMP_CR"
          • sh New Fork (PID: 5594, Parent: 5589)
          • iptables (PID: 5594, Parent: 5589, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -D INPUT -j CWMP_CR
        • na.elf New Fork (PID: 5595, Parent: 5555)
        • sh (PID: 5595, Parent: 5555, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -X CWMP_CR"
          • sh New Fork (PID: 5600, Parent: 5595)
          • iptables (PID: 5600, Parent: 5595, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -X CWMP_CR
        • na.elf New Fork (PID: 5601, Parent: 5555)
        • sh (PID: 5601, Parent: 5555, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -I INPUT -p udp --dport 21170 -j ACCEPT"
          • sh New Fork (PID: 5603, Parent: 5601)
          • iptables (PID: 5603, Parent: 5601, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -I INPUT -p udp --dport 21170 -j ACCEPT
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfAvira: detected
Source: na.elfReversingLabs: Detection: 63%
Source: na.elfVirustotal: Detection: 64%Perma Link

Spreading

barindex
Source: /tmp/na.elf (PID: 5553)Opens: /proc/net/routeJump to behavior

Networking

barindex
Source: /bin/sh (PID: 5565)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5576)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5582)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5588)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5594)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5600)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5603)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 21170 -j ACCEPTJump to behavior
Source: /bin/sh (PID: 5565)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5576)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5582)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5588)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5594)Iptables executable: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5600)Iptables executable: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5603)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 21170 -j ACCEPTJump to behavior
Source: /tmp/na.elf (PID: 5555)Reads hosts file: /etc/hostsJump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknownUDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: router.utorrent.com
Source: global trafficDNS traffic detected: DNS query: router.bittorrent.com
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: LOAD without section mappingsProgram segment: 0x100000
Source: classification engineClassification label: mal72.spre.evad.linELF@0/2@58/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5565)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5576)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5582)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5588)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5594)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5600)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5603)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 21170 -j ACCEPTJump to behavior
Source: /tmp/na.elf (PID: 5555)Directory: /tmp/.pJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/5386/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/5386/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1333/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1333/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1695/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1695/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/911/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/917/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1591/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1591/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1588/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1585/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1585/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/800/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/802/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/3886/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/3886/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/803/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/804/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/804/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/3407/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/3407/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1484/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1484/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/490/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/133/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1479/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1479/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/931/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/931/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1595/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/1595/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/812/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/812/fdJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/933/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5555)File opened: /proc/933/fdJump to behavior
Source: /tmp/na.elf (PID: 5559)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"Jump to behavior
Source: /tmp/na.elf (PID: 5571)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"Jump to behavior
Source: /tmp/na.elf (PID: 5577)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"Jump to behavior
Source: /tmp/na.elf (PID: 5583)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"Jump to behavior
Source: /tmp/na.elf (PID: 5589)Shell command executed: sh -c "iptables -D INPUT -j CWMP_CR"Jump to behavior
Source: /tmp/na.elf (PID: 5595)Shell command executed: sh -c "iptables -X CWMP_CR"Jump to behavior
Source: /tmp/na.elf (PID: 5601)Shell command executed: sh -c "iptables -I INPUT -p udp --dport 21170 -j ACCEPT"Jump to behavior
Source: /bin/sh (PID: 5565)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5576)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5582)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5588)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5594)Iptables executable: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5600)Iptables executable: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5603)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 21170 -j ACCEPTJump to behavior
Source: submitted sampleStderr: iptables v1.8.4 (legacy): Couldn't load target `CWMP_CR':No such file or directoryTry `iptables -h' or 'iptables --help' for more information.iptables: No chain/target/match by that name.: exit code = 0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5555)File: /tmp/na.elfJump to behavior
Source: na.elfSubmission file: segment LOAD with 7.9794 entropy (max. 8.0)
Source: /tmp/na.elf (PID: 5551)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5551.1.00007fffd7a68000.00007fffd7a89000.rw-.sdmp, na.elf, 5553.1.00007fffd7a68000.00007fffd7a89000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5551.1.00005557ada4b000.00005557adad2000.rw-.sdmp, na.elf, 5553.1.00005557ada4b000.00005557adad2000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
Source: na.elf, 5553.1.00007fffd7a68000.00007fffd7a89000.rw-.sdmpBinary or memory string: /tmp/qemu-open.wB9V57
Source: na.elf, 5551.1.00007fffd7a68000.00007fffd7a89000.rw-.sdmp, na.elf, 5553.1.00007fffd7a68000.00007fffd7a89000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
Source: na.elf, 5553.1.00007fffd7a68000.00007fffd7a89000.rw-.sdmpBinary or memory string: WU/tmp/qemu-open.wB9V57
Source: na.elf, 5551.1.00005557ada4b000.00005557adad2000.rw-.sdmp, na.elf, 5553.1.00005557ada4b000.00005557adad2000.rw-.sdmpBinary or memory string: WU!/etc/qemu-binfmt/mips

Anti Debugging

barindex
Source: /tmp/na.elf (PID: 5577)Process with PPID: /bin/sh -> sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Masquerading
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Hidden Files and Directories
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
File Deletion
NTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528819 Sample: na.elf Startdate: 08/10/2024 Architecture: LINUX Score: 72 42 router.utorrent.com 2->42 44 router.bittorrent.com 2->44 46 daisy.ubuntu.com 2->46 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for submitted file 2->52 10 na.elf 2->10         started        signatures3 process4 process5 12 na.elf 10->12         started        signatures6 56 Opens /proc/net/* files useful for finding connected devices and routers 12->56 15 na.elf 12->15         started        process7 signatures8 58 Sample deletes itself 15->58 18 na.elf sh 15->18         started        21 na.elf sh 15->21         started        23 na.elf sh 15->23         started        25 4 other processes 15->25 process9 signatures10 48 Executes itself again with its parent PID as an argument (indicative of hampering debugging) 18->48 27 sh iptables 18->27         started        30 sh iptables 21->30         started        32 sh iptables 23->32         started        34 sh iptables 25->34         started        36 sh iptables 25->36         started        38 sh iptables 25->38         started        40 sh iptables 25->40         started        process11 signatures12 54 Executes the "iptables" command to insert, remove and/or manipulate rules 30->54
SourceDetectionScannerLabelLink
na.elf63%ReversingLabsLinux.Infostealer.Berbew
na.elf64%VirustotalBrowse
na.elf100%AviraLINUX/Hajime.svrdw
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
router.bittorrent.com0%VirustotalBrowse
router.utorrent.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalseunknown
router.bittorrent.com
unknown
unknownfalseunknown
router.utorrent.com
unknown
unknownfalseunknown
No contacted IP infos
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
daisy.ubuntu.comna.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
No context
No context
No context
Process:/tmp/na.elf
File Type:data
Category:dropped
Size (bytes):12
Entropy (8bit):3.418295834054489
Encrypted:false
SSDEEP:3:TgBDln:TgB5
MD5:951B267BD5360B4C3CA7BACED8A2634A
SHA1:6BAC6446FDB84BF0060C4DA5ECB10F2C264B1F03
SHA-256:8DD8E1A24B09832D24EDEC43CEF017CE5AAD2CB185367A22AE07A1055C70C6F8
SHA-512:21F810040E835A5A8BE3614E8252009D92CDA9FAA2D22A34DFDDA15B07CF82171AA4B815BB6F023B2160071727CECF4FCDC09C6E3E6A5333CE11D22A010BEB10
Malicious:false
Reputation:moderate, very likely benign file
Preview:/tmp/na.elf.
Process:/tmp/na.elf
File Type:ASCII text
Category:dropped
Size (bytes):230
Entropy (8bit):3.709552666863289
Encrypted:false
SSDEEP:6:iekrEcvwAsE5KlwSd4pzKaV6Lpms/a/1VCxGF:ur+m5MwSdIKaV6L1adVRF
MD5:2E667F43AE18CD1FE3C108641708A82C
SHA1:12B90DE2DA0FBCFE66F3D6130905E56C8D6A68D3
SHA-256:6F721492E7A337C5B498A8F55F5EB7AC745AFF716D0B5B08EFF2C1B6B250F983
SHA-512:D2A0EE2509154EC1098994F38BE172F98F4150399C534A04D5C675D7C05630802225019F19344CC9070C576BC465A4FEB382AC7712DE6BF25E9244B54A9DB830
Malicious:false
Reputation:high, very likely benign file
Preview:Iface.Destination.Gateway .Flags.RefCnt.Use.Metric.Mask..MTU.Window.IRTT .ens160.00000000.c0a80201.0003.0.0.0.00000000.0.0.0.ens160.c0a80200.00000000.0001.0.0.0.ffffff00.0.0.0.
File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
Entropy (8bit):7.979526539050004
TrID:
  • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
  • ELF Executable and Linkable format (generic) (4004/1) 49.84%
File name:na.elf
File size:83'984 bytes
MD5:5ea3839ef4effebf0c57e18742d1d284
SHA1:a8a3949d509f75217c347dda38c42f1ab53156fc
SHA256:64d671e954c370655d61855ba22381f9bbd929ac713322765686619cebeac480
SHA512:6e21abd1eec9d3c153546d8e68ddc81cefd7b185c2bcb7aa548954ce91d0256569254efb35e7aa88406ab30b651b1f67053cc15992da8cd6e3ff1036320059ec
SSDEEP:1536:yYI0ARqw1qAEW67UIWi7M8gmfmJo0WgswnD6Efyq8PxlRkp2K3/J1V+uo:yYI0ARqw1qAEv7UIFM8oJorFquyjkRke
TLSH:5A831229135414EAD62681F1D3FD1F84AD591F69CEE2EC157C12BC99EE333AD2CC2618
File Content Preview:.ELF....................../....4.........4. ...(......................Bd..Bd.................G...G.................................................^.......?.E.h4...@b..) ..]..0...a.t<..mc.zy/..>..!c...gM\<j..W`xD'..}...\..].j.L.u...S..i...../..F...@`..'k.

ELF header

Class:ELF32
Data:2's complement, big endian
Version:1 (current)
Machine:MIPS R3000
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x112fe8
Flags:0x1007
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:2
Section Header Offset:0
Section Header Size:40
Number of Section Headers:0
Header String Table Index:0
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x1000000x1000000x142640x142647.97940x5R E0x10000
LOAD0xa6c00x47a6c00x47a6c00x00x00.00000x6RW 0x10000
TimestampSource PortDest PortSource IPDest IP
Oct 8, 2024 11:23:38.828138113 CEST5423053192.168.2.151.1.1.1
Oct 8, 2024 11:23:43.991765976 CEST5057953192.168.2.158.8.8.8
Oct 8, 2024 11:23:49.241743088 CEST3878353192.168.2.151.1.1.1
Oct 8, 2024 11:23:54.491446018 CEST3284653192.168.2.158.8.8.8
Oct 8, 2024 11:23:59.741436958 CEST4198353192.168.2.151.1.1.1
Oct 8, 2024 11:24:04.991317034 CEST3775253192.168.2.158.8.8.8
Oct 8, 2024 11:24:08.861870050 CEST4362053192.168.2.158.8.8.8
Oct 8, 2024 11:24:10.241137981 CEST4533753192.168.2.151.1.1.1
Oct 8, 2024 11:24:13.868655920 CEST4573653192.168.2.158.8.8.8
Oct 8, 2024 11:24:15.491317987 CEST4525053192.168.2.158.8.8.8
Oct 8, 2024 11:24:18.887039900 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:24:20.740890026 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:24:23.990811110 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:24:25.990632057 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:24:29.240794897 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:24:31.240616083 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:24:34.490413904 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:24:36.490391016 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:24:39.740542889 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:24:41.740411043 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:24:44.990243912 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:24:46.990386009 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:24:48.917187929 CEST3675253192.168.2.158.8.8.8
Oct 8, 2024 11:24:50.240217924 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:24:52.240191936 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:24:53.926182985 CEST4455153192.168.2.158.8.8.8
Oct 8, 2024 11:24:55.490214109 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:24:57.489949942 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:00.740176916 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:02.739928961 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:05.989665031 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:07.989825010 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:11.239953041 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:13.239840031 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:16.489664078 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:18.489455938 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:21.739552021 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:23.739525080 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:26.989463091 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:28.989213943 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:28.991971016 CEST3694053192.168.2.158.8.8.8
Oct 8, 2024 11:25:32.239280939 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:33.998302937 CEST3293553192.168.2.158.8.8.8
Oct 8, 2024 11:25:34.239187002 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:37.489151955 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:39.488899946 CEST4736653192.168.2.151.1.1.1
Oct 8, 2024 11:25:42.738763094 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:47.988614082 CEST4115753192.168.2.158.8.8.8
Oct 8, 2024 11:25:53.238717079 CEST5191853192.168.2.151.1.1.1
Oct 8, 2024 11:25:58.488454103 CEST5890353192.168.2.158.8.8.8
Oct 8, 2024 11:26:03.738445997 CEST5682353192.168.2.151.1.1.1
Oct 8, 2024 11:26:08.988173962 CEST5743553192.168.2.158.8.8.8
Oct 8, 2024 11:26:09.044315100 CEST5402253192.168.2.15127.0.0.1
Oct 8, 2024 11:26:14.051148891 CEST4300453192.168.2.15127.0.0.1
Oct 8, 2024 11:26:14.237967014 CEST5915353192.168.2.151.1.1.1
Oct 8, 2024 11:26:15.820024014 CEST5732653192.168.2.151.1.1.1
Oct 8, 2024 11:26:15.820024014 CEST4618953192.168.2.151.1.1.1
Oct 8, 2024 11:26:15.921658993 CEST53461891.1.1.1192.168.2.15
Oct 8, 2024 11:26:15.921813965 CEST53573261.1.1.1192.168.2.15
Oct 8, 2024 11:26:19.487674952 CEST4137953192.168.2.158.8.8.8
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Oct 8, 2024 11:23:38.828138113 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:23:43.991765976 CEST192.168.2.158.8.8.80x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:23:49.241743088 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:23:54.491446018 CEST192.168.2.158.8.8.80x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:23:59.741436958 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:04.991317034 CEST192.168.2.158.8.8.80x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:08.861870050 CEST192.168.2.158.8.8.80xd32bStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:10.241137981 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:13.868655920 CEST192.168.2.158.8.8.80xd32bStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:15.491317987 CEST192.168.2.158.8.8.80x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:18.887039900 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:20.740890026 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:23.990811110 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:25.990632057 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:29.240794897 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:31.240616083 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:34.490413904 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:36.490391016 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:39.740542889 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:41.740411043 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:44.990243912 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:46.990386009 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:48.917187929 CEST192.168.2.158.8.8.80xaa84Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:50.240217924 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:52.240191936 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:53.926182985 CEST192.168.2.158.8.8.80xaa84Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:55.490214109 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:24:57.489949942 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:00.740176916 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:02.739928961 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:05.989665031 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:07.989825010 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:11.239953041 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:13.239840031 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:16.489664078 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:18.489455938 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:21.739552021 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:23.739525080 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:26.989463091 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:28.989213943 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:28.991971016 CEST192.168.2.158.8.8.80xdacdStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:32.239280939 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:33.998302937 CEST192.168.2.158.8.8.80xdacdStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:34.239187002 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:37.489151955 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:39.488899946 CEST192.168.2.151.1.1.10x4fffStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:42.738763094 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:47.988614082 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:53.238717079 CEST192.168.2.151.1.1.10xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:25:58.488454103 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:26:03.738445997 CEST192.168.2.151.1.1.10xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:26:08.988173962 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:26:09.044315100 CEST192.168.2.15127.0.0.10x5da9Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:26:14.051148891 CEST192.168.2.15127.0.0.10x5da9Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:26:14.237967014 CEST192.168.2.151.1.1.10xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:26:15.820024014 CEST192.168.2.151.1.1.10x8081Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
Oct 8, 2024 11:26:15.820024014 CEST192.168.2.151.1.1.10x18ecStandard query (0)daisy.ubuntu.com28IN (0x0001)false
Oct 8, 2024 11:26:19.487674952 CEST192.168.2.158.8.8.80xa237Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Oct 8, 2024 11:26:15.921813965 CEST1.1.1.1192.168.2.150x8081No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
Oct 8, 2024 11:26:15.921813965 CEST1.1.1.1192.168.2.150x8081No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

System Behavior

Start time (UTC):09:23:30
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:/tmp/na.elf
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:30
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:31
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:36
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:36
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:36
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:36
Start date (UTC):08/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -A INPUT -p tcp --destination-port 23 -j DROP
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):09:23:36
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:36
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:36
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:36
Start date (UTC):08/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -A INPUT -p tcp --destination-port 7547 -j DROP
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -A INPUT -p tcp --destination-port 5555 -j DROP
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -A INPUT -p tcp --destination-port 5358 -j DROP
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -D INPUT -j CWMP_CR"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -D INPUT -j CWMP_CR
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -X CWMP_CR"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -X CWMP_CR
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -I INPUT -p udp --dport 21170 -j ACCEPT"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):09:23:37
Start date (UTC):08/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -I INPUT -p udp --dport 21170 -j ACCEPT
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af