IOC Report
na.elf

loading gif

Files

File Path
Type
Category
Malicious
na.elf
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), statically linked, no section header
initial sample
malicious
/var/spool/cron/crontabs/tmp.Ckn82q
ASCII text
dropped
malicious
/sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages
very short file (no magic)
dropped
/sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/tmp/na.elf
-
/bin/sh
sh -c "command -v crontab >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
/bin/sh
-
/usr/bin/crontab
crontab -r
/bin/sh
-
/bin/sh
-
/usr/bin/crontab
crontab -
/tmp/na.elf
-
/bin/sh
sh -c "command -v php >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "command -v nginx >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "which apache2"
/bin/sh
-
/usr/bin/which
which apache2
/tmp/na.elf
-
/bin/sh
sh -c "which httpd"
/bin/sh
-
/usr/bin/which
which httpd
/tmp/na.elf
-
/tmp/na.elf
-
/bin/sh
sh -c "iptables -I INPUT -p tcp --dport 60041 -j ACCEPT >/dev/null 2>&1"
/bin/sh
-
/usr/sbin/iptables
iptables -I INPUT -p tcp --dport 60041 -j ACCEPT
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.Af0o5XGEoP /tmp/tmp.kd6KiOuabn /tmp/tmp.uBdaIPQQTx
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.Af0o5XGEoP /tmp/tmp.kd6KiOuabn /tmp/tmp.uBdaIPQQTx
There are 22 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
malicious
https://gcc.gnu.org/bugs/):
unknown
https://xmrig.com/wizard
unknown
https://xmrig.com/wizard%s
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4000396000
page execute read
malicious
7ffe590c0000
page read and write
7ff9c348a000
page read and write
7ff9c37b8000
page read and write
7ff9c3794000
page read and write
7ff9c32a8000
page read and write
7ff9c3119000
page read and write
4000d42000
page read and write
5624df877000
page read and write
4000d4a000
page read and write
4000d36000
page read and write
5624dfd4d000
page read and write
7ffe59181000
page execute read
4000d3b000
page read and write
7ff9c2b4c000
page read and write
4000d37000
page execute read
5624df861000
page execute and read and write
5624dd863000
page read and write
7ff9bc021000
page read and write
7ff9c366b000
page read and write
40003d1000
page read and write
7ff9c37fd000
page read and write
7ff9c2eae000
page read and write
7ff9c313c000
page read and write
5624dd5db000
page execute read
7ff9c2aba000
page read and write
4000d5d000
page read and write
4000d3d000
page read and write
7ff9c22b2000
page read and write
5624dd858000
page read and write
There are 20 hidden memdumps, click here to show them.