IOC Report
na.elf

loading gif

Files

File Path
Type
Category
Malicious
na.elf
ELF 32-bit LSB shared object, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
initial sample
malicious
/var/spool/cron/crontabs/tmp.NT5FO0
ASCII text
dropped
malicious
/sys/devices/system/node/node0/hugepages/hugepages-1048576kB/nr_hugepages
very short file (no magic)
dropped
/sys/devices/system/node/node0/hugepages/hugepages-2048kB/nr_hugepages
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/tmp/na.elf
-
/bin/sh
sh -c "command -v crontab >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "crontab -r >/dev/null 2>&1; echo \"@reboot /tmp/na.elf\" | crontab -"
/bin/sh
-
/usr/bin/crontab
crontab -r
/bin/sh
-
/bin/sh
-
/usr/bin/crontab
crontab -
/tmp/na.elf
-
/bin/sh
sh -c "command -v php >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "command -v nginx >/dev/null 2>&1"
/tmp/na.elf
-
/bin/sh
sh -c "which apache2"
/bin/sh
-
/usr/bin/which
which apache2
/tmp/na.elf
-
/bin/sh
sh -c "which httpd"
/bin/sh
-
/usr/bin/which
which httpd
/tmp/na.elf
-
/tmp/na.elf
-
/bin/sh
sh -c "iptables -I INPUT -p tcp --dport 50101 -j ACCEPT >/dev/null 2>&1"
/bin/sh
-
/usr/sbin/iptables
iptables -I INPUT -p tcp --dport 50101 -j ACCEPT
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
malicious
https://gcc.gnu.org/bugs/):
unknown
https://xmrig.com/wizard
unknown
https://xmrig.com/wizard%s
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
f7de0000
page execute read
malicious
f7930000
page execute read
f7f8b000
page read and write
f7dfd000
page read and write
58362000
page read and write
f7f8f000
page read and write
ffbad000
page read and write
f7f83000
page read and write