IOC Report
na.elf

loading gif

Files

File Path
Type
Category
Malicious
na.elf
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), statically linked, no section header
initial sample
malicious
/var/spool/cron/crontabs/tmp.sQeN7r
ASCII text
dropped
malicious
/sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages
very short file (no magic)
dropped
/sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/tmp/na.elf
-
/bin/sh
sh -c "command -v crontab >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
/bin/sh
-
/usr/bin/crontab
crontab -r
/bin/sh
-
/bin/sh
-
/usr/bin/crontab
crontab -
/tmp/na.elf
-
/bin/sh
sh -c "command -v php >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "command -v nginx >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "which apache2"
/bin/sh
-
/usr/bin/which
which apache2
/tmp/na.elf
-
/bin/sh
sh -c "which httpd"
/bin/sh
-
/usr/bin/which
which httpd
/tmp/na.elf
-
/tmp/na.elf
-
/bin/sh
sh -c "iptables -I INPUT -p tcp --dport 60601 -j ACCEPT >/dev/null 2>&1"
/bin/sh
-
/usr/sbin/iptables
iptables -I INPUT -p tcp --dport 60601 -j ACCEPT
/tmp/na.elf
-
/bin/sh
sh -c "/sbin/modprobe msr allow_writes=on > /dev/null 2>&1"
/bin/sh
-
/sbin/modprobe
/sbin/modprobe msr allow_writes=on
There are 22 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
malicious
https://xmrig.com/wizard
unknown
https://gcc.gnu.org/bugsNSt7__cxx1115basic_stringbufIcSt11char_traitsIcESaIcEEENSt7__cxx1119basic_is
unknown
https://gcc.gnu.org/bugs
unknown
https://xmrig.com/wizard%s
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7f1da4756000
page execute read
malicious
7f1da4b10000
page read and write
7f1da4b1a000
page read and write
7f1da4b0d000
page execute read
7ffcdbe36000
page read and write
7f1da4b1d000
page read and write
5555562d0000
page read and write
7ffcdbf99000
page execute read
7f1da4981000
page read and write
7f1da4aed000
page read and write