Linux Analysis Report
na.elf

Overview

General Information

Sample name: na.elf
Analysis ID: 1532542
MD5: 0d4707ea533f1129a391e353f65c553c
SHA1: 0cb976511225978ba12625d93be05bf809ad5a41
SHA256: 9019f250f305830e4e9f743ccf75669dffc10e37aa797613f17f2793fa8713cc
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 68
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes the "iptables" command to insert, remove and/or manipulate rules
Opens /proc/net/* files useful for finding connected devices and routers
Sample deletes itself
Creates hidden files and/or directories
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: na.elf Avira: detected
Source: na.elf ReversingLabs: Detection: 50%
Source: na.elf Virustotal: Detection: 56% Perma Link

Spreading

barindex
Source: /tmp/na.elf (PID: 5491) Opens: /proc/net/route Jump to behavior

Networking

barindex
Source: /bin/sh (PID: 5509) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROP Jump to behavior
Source: /bin/sh (PID: 5520) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROP Jump to behavior
Source: /bin/sh (PID: 5526) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROP Jump to behavior
Source: /bin/sh (PID: 5532) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROP Jump to behavior
Source: /bin/sh (PID: 5540) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CR Jump to behavior
Source: /bin/sh (PID: 5546) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -X CWMP_CR Jump to behavior
Source: /bin/sh (PID: 5552) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 53681 -j ACCEPT Jump to behavior
Source: /bin/sh (PID: 5509) Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROP Jump to behavior
Source: /bin/sh (PID: 5520) Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROP Jump to behavior
Source: /bin/sh (PID: 5526) Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROP Jump to behavior
Source: /bin/sh (PID: 5532) Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROP Jump to behavior
Source: /bin/sh (PID: 5540) Iptables executable: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CR Jump to behavior
Source: /bin/sh (PID: 5546) Iptables executable: /usr/sbin/iptables -> iptables -X CWMP_CR Jump to behavior
Source: /bin/sh (PID: 5552) Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 53681 -j ACCEPT Jump to behavior
Source: /tmp/na.elf (PID: 5495) Reads hosts file: /etc/hosts Jump to behavior
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: router.utorrent.com
Source: global traffic DNS traffic detected: DNS query: router.bittorrent.com
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: LOAD without section mappings Program segment: 0x100000
Source: classification engine Classification label: mal68.spre.evad.linELF@0/2@58/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5509) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROP Jump to behavior
Source: /bin/sh (PID: 5520) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROP Jump to behavior
Source: /bin/sh (PID: 5526) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROP Jump to behavior
Source: /bin/sh (PID: 5532) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROP Jump to behavior
Source: /bin/sh (PID: 5540) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CR Jump to behavior
Source: /bin/sh (PID: 5546) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -X CWMP_CR Jump to behavior
Source: /bin/sh (PID: 5552) Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 53681 -j ACCEPT Jump to behavior
Source: /tmp/na.elf (PID: 5495) Directory: /tmp/.p Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3760/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3761/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/2672/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1583/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3759/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1577/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1577/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/234/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/119/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3758/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/917/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/917/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/10/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/11/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/12/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/13/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/14/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/15/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/16/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/17/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/18/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/19/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1593/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1593/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/240/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3094/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3094/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/120/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3406/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3406/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/242/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/121/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/243/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/122/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1589/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1589/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/244/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/123/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/2/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1588/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/1588/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/245/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/124/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3402/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3402/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/246/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/125/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/4/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/247/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/126/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/5/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/248/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/127/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/6/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/249/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/128/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/7/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/800/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/800/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/129/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/8/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/801/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/801/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/9/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/803/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/803/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/806/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/806/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/20/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/928/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/928/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/807/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/807/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/21/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/22/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/23/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/24/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/25/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/26/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/27/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/28/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/29/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3420/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/3420/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/490/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/490/fd Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/250/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/251/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/130/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/252/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/131/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5495) File opened: /proc/253/cmdline Jump to behavior
Source: /tmp/na.elf (PID: 5503) Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP" Jump to behavior
Source: /tmp/na.elf (PID: 5515) Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP" Jump to behavior
Source: /tmp/na.elf (PID: 5521) Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP" Jump to behavior
Source: /tmp/na.elf (PID: 5527) Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP" Jump to behavior
Source: /tmp/na.elf (PID: 5535) Shell command executed: sh -c "iptables -D INPUT -j CWMP_CR" Jump to behavior
Source: /tmp/na.elf (PID: 5541) Shell command executed: sh -c "iptables -X CWMP_CR" Jump to behavior
Source: /tmp/na.elf (PID: 5547) Shell command executed: sh -c "iptables -I INPUT -p udp --dport 53681 -j ACCEPT" Jump to behavior
Source: /bin/sh (PID: 5509) Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROP Jump to behavior
Source: /bin/sh (PID: 5520) Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROP Jump to behavior
Source: /bin/sh (PID: 5526) Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROP Jump to behavior
Source: /bin/sh (PID: 5532) Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROP Jump to behavior
Source: /bin/sh (PID: 5540) Iptables executable: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CR Jump to behavior
Source: /bin/sh (PID: 5546) Iptables executable: /usr/sbin/iptables -> iptables -X CWMP_CR Jump to behavior
Source: /bin/sh (PID: 5552) Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 53681 -j ACCEPT Jump to behavior
Source: submitted sample Stderr: iptables v1.8.4 (legacy): Couldn't load target `CWMP_CR':No such file or directoryTry `iptables -h' or 'iptables --help' for more information.iptables: No chain/target/match by that name.: exit code = 0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5495) File: /tmp/na.elf Jump to behavior
Source: na.elf Submission file: segment LOAD with 7.9794 entropy (max. 8.0)
Source: /tmp/na.elf (PID: 5489) Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5489.1.00007ffc26416000.00007ffc26437000.rw-.sdmp, na.elf, 5491.1.00007ffc26416000.00007ffc26437000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-mips/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5489.1.000055df18f5c000.000055df18fe3000.rw-.sdmp, na.elf, 5491.1.000055df18f5c000.000055df18fe3000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/mips
Source: na.elf, 5489.1.000055df18f5c000.000055df18fe3000.rw-.sdmp, na.elf, 5491.1.000055df18f5c000.000055df18fe3000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mips
Source: na.elf, 5489.1.00007ffc26416000.00007ffc26437000.rw-.sdmp, na.elf, 5491.1.00007ffc26416000.00007ffc26437000.rw-.sdmp Binary or memory string: /usr/bin/qemu-mips
Source: na.elf, 5491.1.00007ffc26416000.00007ffc26437000.rw-.sdmp Binary or memory string: U/tmp/qemu-open.9utNmr
Source: na.elf, 5491.1.00007ffc26416000.00007ffc26437000.rw-.sdmp Binary or memory string: /tmp/qemu-open.9utNmr
No contacted IP infos