Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1532542
MD5:0d4707ea533f1129a391e353f65c553c
SHA1:0cb976511225978ba12625d93be05bf809ad5a41
SHA256:9019f250f305830e4e9f743ccf75669dffc10e37aa797613f17f2793fa8713cc
Tags:elfuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes the "iptables" command to insert, remove and/or manipulate rules
Opens /proc/net/* files useful for finding connected devices and routers
Sample deletes itself
Creates hidden files and/or directories
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532542
Start date and time:2024-10-13 16:11:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 4s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal68.spre.evad.linELF@0/2@58/0
  • Excluded IPs from analysis (whitelisted): 89.58.43.2, 168.119.183.207, 129.70.132.34, 185.233.107.180
  • Excluded domains from analysis (whitelisted): pool.ntp.org
Command:/tmp/na.elf
PID:5489
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:iptables v1.8.4 (legacy): Couldn't load target `CWMP_CR':No such file or directory

Try `iptables -h' or 'iptables --help' for more information.
iptables: No chain/target/match by that name.
  • system is lnxubuntu20
  • na.elf (PID: 5489, Parent: 5415, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5491, Parent: 5489)
      • na.elf New Fork (PID: 5495, Parent: 5491)
        • na.elf New Fork (PID: 5503, Parent: 5495)
        • sh (PID: 5503, Parent: 5495, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
          • sh New Fork (PID: 5509, Parent: 5503)
          • iptables (PID: 5509, Parent: 5503, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 23 -j DROP
        • na.elf New Fork (PID: 5515, Parent: 5495)
        • sh (PID: 5515, Parent: 5495, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
          • sh New Fork (PID: 5520, Parent: 5515)
          • iptables (PID: 5520, Parent: 5515, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 7547 -j DROP
        • na.elf New Fork (PID: 5521, Parent: 5495)
        • sh (PID: 5521, Parent: 5495, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
          • sh New Fork (PID: 5526, Parent: 5521)
          • iptables (PID: 5526, Parent: 5521, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 5555 -j DROP
        • na.elf New Fork (PID: 5527, Parent: 5495)
        • sh (PID: 5527, Parent: 5495, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
          • sh New Fork (PID: 5532, Parent: 5527)
          • iptables (PID: 5532, Parent: 5527, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 5358 -j DROP
        • na.elf New Fork (PID: 5535, Parent: 5495)
        • sh (PID: 5535, Parent: 5495, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -D INPUT -j CWMP_CR"
          • sh New Fork (PID: 5540, Parent: 5535)
          • iptables (PID: 5540, Parent: 5535, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -D INPUT -j CWMP_CR
        • na.elf New Fork (PID: 5541, Parent: 5495)
        • sh (PID: 5541, Parent: 5495, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -X CWMP_CR"
          • sh New Fork (PID: 5546, Parent: 5541)
          • iptables (PID: 5546, Parent: 5541, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -X CWMP_CR
        • na.elf New Fork (PID: 5547, Parent: 5495)
        • sh (PID: 5547, Parent: 5495, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -I INPUT -p udp --dport 53681 -j ACCEPT"
          • sh New Fork (PID: 5552, Parent: 5547)
          • iptables (PID: 5552, Parent: 5547, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -I INPUT -p udp --dport 53681 -j ACCEPT
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfAvira: detected
Source: na.elfReversingLabs: Detection: 50%
Source: na.elfVirustotal: Detection: 56%Perma Link

Spreading

barindex
Source: /tmp/na.elf (PID: 5491)Opens: /proc/net/routeJump to behavior

Networking

barindex
Source: /bin/sh (PID: 5509)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5520)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5526)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5532)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5540)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5546)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5552)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 53681 -j ACCEPTJump to behavior
Source: /bin/sh (PID: 5509)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5520)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5526)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5532)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5540)Iptables executable: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5546)Iptables executable: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5552)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 53681 -j ACCEPTJump to behavior
Source: /tmp/na.elf (PID: 5495)Reads hosts file: /etc/hostsJump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: router.utorrent.com
Source: global trafficDNS traffic detected: DNS query: router.bittorrent.com
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: LOAD without section mappingsProgram segment: 0x100000
Source: classification engineClassification label: mal68.spre.evad.linELF@0/2@58/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5509)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5520)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5526)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5532)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5540)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5546)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5552)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 53681 -j ACCEPTJump to behavior
Source: /tmp/na.elf (PID: 5495)Directory: /tmp/.pJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3760/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3761/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3759/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1577/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3758/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/917/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1593/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3094/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3406/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1589/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/1588/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3402/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/800/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/801/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/803/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/806/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/928/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/807/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/3420/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/490/fdJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5495)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/na.elf (PID: 5503)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"Jump to behavior
Source: /tmp/na.elf (PID: 5515)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"Jump to behavior
Source: /tmp/na.elf (PID: 5521)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"Jump to behavior
Source: /tmp/na.elf (PID: 5527)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"Jump to behavior
Source: /tmp/na.elf (PID: 5535)Shell command executed: sh -c "iptables -D INPUT -j CWMP_CR"Jump to behavior
Source: /tmp/na.elf (PID: 5541)Shell command executed: sh -c "iptables -X CWMP_CR"Jump to behavior
Source: /tmp/na.elf (PID: 5547)Shell command executed: sh -c "iptables -I INPUT -p udp --dport 53681 -j ACCEPT"Jump to behavior
Source: /bin/sh (PID: 5509)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5520)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5526)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5532)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5540)Iptables executable: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5546)Iptables executable: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5552)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 53681 -j ACCEPTJump to behavior
Source: submitted sampleStderr: iptables v1.8.4 (legacy): Couldn't load target `CWMP_CR':No such file or directoryTry `iptables -h' or 'iptables --help' for more information.iptables: No chain/target/match by that name.: exit code = 0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5495)File: /tmp/na.elfJump to behavior
Source: na.elfSubmission file: segment LOAD with 7.9794 entropy (max. 8.0)
Source: /tmp/na.elf (PID: 5489)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5489.1.00007ffc26416000.00007ffc26437000.rw-.sdmp, na.elf, 5491.1.00007ffc26416000.00007ffc26437000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5489.1.000055df18f5c000.000055df18fe3000.rw-.sdmp, na.elf, 5491.1.000055df18f5c000.000055df18fe3000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mips
Source: na.elf, 5489.1.000055df18f5c000.000055df18fe3000.rw-.sdmp, na.elf, 5491.1.000055df18f5c000.000055df18fe3000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
Source: na.elf, 5489.1.00007ffc26416000.00007ffc26437000.rw-.sdmp, na.elf, 5491.1.00007ffc26416000.00007ffc26437000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
Source: na.elf, 5491.1.00007ffc26416000.00007ffc26437000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.9utNmr
Source: na.elf, 5491.1.00007ffc26416000.00007ffc26437000.rw-.sdmpBinary or memory string: /tmp/qemu-open.9utNmr
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
File Deletion
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532542 Sample: na.elf Startdate: 13/10/2024 Architecture: LINUX Score: 68 41 router.utorrent.com 2->41 43 router.bittorrent.com 2->43 45 daisy.ubuntu.com 2->45 47 Antivirus / Scanner detection for submitted sample 2->47 49 Multi AV Scanner detection for submitted file 2->49 10 na.elf 2->10         started        signatures3 process4 process5 12 na.elf 10->12         started        signatures6 53 Opens /proc/net/* files useful for finding connected devices and routers 12->53 15 na.elf 12->15         started        process7 signatures8 55 Sample deletes itself 15->55 18 na.elf sh 15->18         started        20 na.elf sh 15->20         started        22 na.elf sh 15->22         started        24 4 other processes 15->24 process9 process10 26 sh iptables 18->26         started        29 sh iptables 20->29         started        31 sh iptables 22->31         started        33 sh iptables 24->33         started        35 sh iptables 24->35         started        37 sh iptables 24->37         started        39 sh iptables 24->39         started        signatures11 51 Executes the "iptables" command to insert, remove and/or manipulate rules 26->51

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
na.elf50%ReversingLabsLinux.Backdoor.Hajime
na.elf57%VirustotalBrowse
na.elf100%AviraLINUX/Hajime.wkfyd
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
router.bittorrent.com0%VirustotalBrowse
router.utorrent.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalseunknown
router.bittorrent.com
unknown
unknownfalseunknown
router.utorrent.com
unknown
unknownfalseunknown
No contacted IP infos
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
daisy.ubuntu.comna.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.24
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
na.elfGet hashmaliciousUnknownBrowse
  • 162.213.35.25
No context
No context
No context
Process:/tmp/na.elf
File Type:data
Category:dropped
Size (bytes):12
Entropy (8bit):3.418295834054489
Encrypted:false
SSDEEP:3:TgBDln:TgB5
MD5:951B267BD5360B4C3CA7BACED8A2634A
SHA1:6BAC6446FDB84BF0060C4DA5ECB10F2C264B1F03
SHA-256:8DD8E1A24B09832D24EDEC43CEF017CE5AAD2CB185367A22AE07A1055C70C6F8
SHA-512:21F810040E835A5A8BE3614E8252009D92CDA9FAA2D22A34DFDDA15B07CF82171AA4B815BB6F023B2160071727CECF4FCDC09C6E3E6A5333CE11D22A010BEB10
Malicious:false
Reputation:moderate, very likely benign file
Preview:/tmp/na.elf.
Process:/tmp/na.elf
File Type:ASCII text
Category:dropped
Size (bytes):230
Entropy (8bit):3.709552666863289
Encrypted:false
SSDEEP:6:iekrEcvwAsE5KlwSd4pzKaV6Lpms/a/1VCxGF:ur+m5MwSdIKaV6L1adVRF
MD5:2E667F43AE18CD1FE3C108641708A82C
SHA1:12B90DE2DA0FBCFE66F3D6130905E56C8D6A68D3
SHA-256:6F721492E7A337C5B498A8F55F5EB7AC745AFF716D0B5B08EFF2C1B6B250F983
SHA-512:D2A0EE2509154EC1098994F38BE172F98F4150399C534A04D5C675D7C05630802225019F19344CC9070C576BC465A4FEB382AC7712DE6BF25E9244B54A9DB830
Malicious:false
Reputation:high, very likely benign file
Preview:Iface.Destination.Gateway .Flags.RefCnt.Use.Metric.Mask..MTU.Window.IRTT .ens160.00000000.c0a80201.0003.0.0.0.00000000.0.0.0.ens160.c0a80200.00000000.0001.0.0.0.ffffff00.0.0.0.
File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
Entropy (8bit):7.979215609150252
TrID:
  • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
  • ELF Executable and Linkable format (generic) (4004/1) 49.84%
File name:na.elf
File size:82'824 bytes
MD5:0d4707ea533f1129a391e353f65c553c
SHA1:0cb976511225978ba12625d93be05bf809ad5a41
SHA256:9019f250f305830e4e9f743ccf75669dffc10e37aa797613f17f2793fa8713cc
SHA512:c2776a677202995c4d492ec0baa47decb42d50306ace215a880e9317a158725af3ea406a812a2b8706b6a1c5b23050439294a911c35b5ad8766189e97bfb5cff
SSDEEP:1536:yYI0ARqw1qAEW67UIWi7M8gmfmJo0WgswnD6Efyq8PxlRkp2K3/J1V+ui:yYI0ARqw1qAEv7UIFM8oJorFquyjkRkg
TLSH:69831229235524E5D62281F0E7FD1B84AD591F69CEE2EC15BC12BC89EE333AD3CC2518
File Content Preview:.ELF....................../....4.........4. ...(......................Bd..Bd.................G...G.................................................^.......?.E.h4...@b..) ..]..0...a.t<..mc.zy/..>..!c...gM\<j..W`xD'..}...\..].j.L.u...S..i...../..F...@`..'k.

ELF header

Class:ELF32
Data:2's complement, big endian
Version:1 (current)
Machine:MIPS R3000
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x112fe8
Flags:0x1007
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:2
Section Header Offset:0
Section Header Size:40
Number of Section Headers:0
Header String Table Index:0
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x1000000x1000000x142640x142647.97940x5R E0x10000
LOAD0xa6c00x47a6c00x47a6c00x00x00.00000x6RW 0x10000
TimestampSource PortDest PortSource IPDest IP
Oct 13, 2024 16:12:05.213000059 CEST3945553192.168.2.148.8.8.8
Oct 13, 2024 16:12:10.437211990 CEST3510553192.168.2.141.1.1.1
Oct 13, 2024 16:12:15.686763048 CEST5417153192.168.2.148.8.8.8
Oct 13, 2024 16:12:20.936783075 CEST3406553192.168.2.141.1.1.1
Oct 13, 2024 16:12:26.186693907 CEST4790853192.168.2.148.8.8.8
Oct 13, 2024 16:12:31.436752081 CEST4622653192.168.2.141.1.1.1
Oct 13, 2024 16:12:35.231314898 CEST4042253192.168.2.148.8.8.8
Oct 13, 2024 16:12:36.686367035 CEST6015953192.168.2.148.8.8.8
Oct 13, 2024 16:12:40.239984035 CEST5916153192.168.2.148.8.8.8
Oct 13, 2024 16:12:41.936266899 CEST5096753192.168.2.141.1.1.1
Oct 13, 2024 16:12:45.250591040 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:12:47.185930014 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:12:50.435867071 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:12:52.435688019 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:12:55.685878992 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:12:57.685532093 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:00.935431004 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:02.935270071 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:06.185445070 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:08.185233116 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:11.435251951 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:13.435209990 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:15.286797047 CEST4364453192.168.2.148.8.8.8
Oct 13, 2024 16:13:16.685148001 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:18.684883118 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:20.294708014 CEST3955253192.168.2.148.8.8.8
Oct 13, 2024 16:13:21.934963942 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:23.934783936 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:27.184868097 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:29.184705019 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:32.434655905 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:34.434567928 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:37.684501886 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:39.684272051 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:42.934226990 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:44.934081078 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:48.184128046 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:50.184200048 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:53.433978081 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:13:55.370587111 CEST4291453192.168.2.148.8.8.8
Oct 13, 2024 16:13:55.433759928 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:13:58.683943033 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:14:00.379705906 CEST5065153192.168.2.148.8.8.8
Oct 13, 2024 16:14:00.683634996 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:14:03.933582067 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:14:05.933440924 CEST3384553192.168.2.148.8.8.8
Oct 13, 2024 16:14:09.183470011 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:14:14.433507919 CEST5217053192.168.2.141.1.1.1
Oct 13, 2024 16:14:19.683213949 CEST4348553192.168.2.148.8.8.8
Oct 13, 2024 16:14:24.933197021 CEST5471653192.168.2.141.1.1.1
Oct 13, 2024 16:14:30.183006048 CEST5669453192.168.2.148.8.8.8
Oct 13, 2024 16:14:35.427941084 CEST5814653192.168.2.14127.0.0.1
Oct 13, 2024 16:14:35.432512999 CEST4860153192.168.2.141.1.1.1
Oct 13, 2024 16:14:40.432743073 CEST5260753192.168.2.14127.0.0.1
Oct 13, 2024 16:14:40.682413101 CEST5164853192.168.2.148.8.8.8
Oct 13, 2024 16:14:43.529710054 CEST5563053192.168.2.148.8.8.8
Oct 13, 2024 16:14:43.529783010 CEST6077253192.168.2.148.8.8.8
Oct 13, 2024 16:14:43.536883116 CEST53556308.8.8.8192.168.2.14
Oct 13, 2024 16:14:43.536930084 CEST53607728.8.8.8192.168.2.14
Oct 13, 2024 16:14:45.932102919 CEST4571753192.168.2.141.1.1.1
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Oct 13, 2024 16:12:05.213000059 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:10.437211990 CEST192.168.2.141.1.1.10x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:15.686763048 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:20.936783075 CEST192.168.2.141.1.1.10x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:26.186693907 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:31.436752081 CEST192.168.2.141.1.1.10x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:35.231314898 CEST192.168.2.148.8.8.80xcddStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:36.686367035 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:40.239984035 CEST192.168.2.148.8.8.80xcddStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:41.936266899 CEST192.168.2.141.1.1.10x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:45.250591040 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:47.185930014 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:50.435867071 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:52.435688019 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:55.685878992 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:12:57.685532093 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:00.935431004 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:02.935270071 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:06.185445070 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:08.185233116 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:11.435251951 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:13.435209990 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:15.286797047 CEST192.168.2.148.8.8.80xa5d5Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:16.685148001 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:18.684883118 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:20.294708014 CEST192.168.2.148.8.8.80xa5d5Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:21.934963942 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:23.934783936 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:27.184868097 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:29.184705019 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:32.434655905 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:34.434567928 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:37.684501886 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:39.684272051 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:42.934226990 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:44.934081078 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:48.184128046 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:50.184200048 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:53.433978081 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:55.370587111 CEST192.168.2.148.8.8.80xddedStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:55.433759928 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:13:58.683943033 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:00.379705906 CEST192.168.2.148.8.8.80xddedStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:00.683634996 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:03.933582067 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:05.933440924 CEST192.168.2.148.8.8.80x597eStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:09.183470011 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:14.433507919 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:19.683213949 CEST192.168.2.148.8.8.80xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:24.933197021 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:30.183006048 CEST192.168.2.148.8.8.80xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:35.427941084 CEST192.168.2.14127.0.0.10x8ff4Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:35.432512999 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:40.432743073 CEST192.168.2.14127.0.0.10x8ff4Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:40.682413101 CEST192.168.2.148.8.8.80xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:43.529710054 CEST192.168.2.148.8.8.80x6821Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
Oct 13, 2024 16:14:43.529783010 CEST192.168.2.148.8.8.80xc920Standard query (0)daisy.ubuntu.com28IN (0x0001)false
Oct 13, 2024 16:14:45.932102919 CEST192.168.2.141.1.1.10xf319Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Oct 13, 2024 16:14:43.536883116 CEST8.8.8.8192.168.2.140x6821No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
Oct 13, 2024 16:14:43.536883116 CEST8.8.8.8192.168.2.140x6821No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

System Behavior

Start time (UTC):14:11:58
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:/tmp/na.elf
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:11:58
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:11:58
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -A INPUT -p tcp --destination-port 23 -j DROP
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -A INPUT -p tcp --destination-port 7547 -j DROP
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -A INPUT -p tcp --destination-port 5555 -j DROP
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -A INPUT -p tcp --destination-port 5358 -j DROP
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -D INPUT -j CWMP_CR"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -D INPUT -j CWMP_CR
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -X CWMP_CR"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -X CWMP_CR
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/tmp/na.elf
Arguments:-
File size:5777432 bytes
MD5 hash:0083f1f0e77be34ad27f849842bbb00c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:sh -c "iptables -I INPUT -p udp --dport 53681 -j ACCEPT"
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/bin/sh
Arguments:-
File size:129816 bytes
MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

Start time (UTC):14:12:03
Start date (UTC):13/10/2024
Path:/usr/sbin/iptables
Arguments:iptables -I INPUT -p udp --dport 53681 -j ACCEPT
File size:99296 bytes
MD5 hash:1ab05fef765b6342cdfadaa5275b33af