IOC Report
linux_386.elf

loading gif

Files

File Path
Type
Category
Malicious
linux_386.elf
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, Go BuildID=M2967KDc3JCv7JT3dJNl/UwKSzruSqayTIOWLZXXm/BURNZtNWG7QV-0pWXslf/aajqpRFtYnvbFht06OtE, stripped
initial sample
malicious
/etc/32678
POSIX shell script, ASCII text executable
dropped
malicious
/etc/crontab
ASCII text
dropped
malicious
/etc/init.d/linux_kill
POSIX shell script, ASCII text executable
dropped
malicious
/etc/init.d/ssh
POSIX shell script, ASCII text executable
dropped
malicious
/etc/profile.d/bash_config.sh
a /bin/sh\n/etc/profile.d/bash_config script, ASCII text executable, with no line terminators
dropped
malicious
/.img
a /bin/sh\n/usr/lib/libdlrpcld.so script, ASCII text executable, with no line terminators
dropped
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/proc/6667/loginuid
very short file (no magic)
dropped
/proc/6673/loginuid
very short file (no magic)
dropped
/run/crond.pid
ASCII text
dropped
/tmp/#531563 (deleted)
ASCII text
dropped
/usr/lib/systemd/system/linux.service
ASCII text
dropped
/var/log/btmp
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
/tmp/linux_386.elf
/tmp/linux_386.elf
/tmp/linux_386.elf
-
/bin/bash
/bin/bash -c /etc/32678&
/bin/bash
-
/etc/32678
/etc/32678
/etc/32678
-
/usr/bin/sleep
sleep 60
/tmp/linux_386.elf
-
/usr/sbin/service
service crond start
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/systemctl
systemctl --quiet is-active multi-user.target
/usr/sbin/service
-
/usr/sbin/service
-
/usr/bin/systemctl
systemctl list-unit-files --full --type=socket
/usr/sbin/service
-
/usr/bin/sed
sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
/usr/bin/systemctl
systemctl start crond.service
/tmp/linux_386.elf
-
/tmp/linux_386.elf
/tmp/linux_386.elf
/tmp/linux_386.elf
-
/usr/sbin/update-rc.d
update-rc.d linux_kill defaults
/usr/sbin/update-rc.d
-
/usr/bin/systemctl
systemctl daemon-reload
/tmp/linux_386.elf
-
/bin/bash
/bin/bash -c "cd /boot;systemctl daemon-reload;systemctl enable linux.service;systemctl start linux.service;journalctl -xe --no-pager"
/bin/bash
-
/usr/bin/systemctl
systemctl daemon-reload
/bin/bash
-
/usr/bin/systemctl
systemctl enable linux.service
/bin/bash
-
/usr/bin/systemctl
systemctl start linux.service
/bin/bash
-
/usr/bin/journalctl
journalctl -xe --no-pager
/tmp/linux_386.elf
-
/bin/bash
/bin/bash -c "cd /boot;ausearch -c 'System.img.conf' --raw | audit2allow -M my-Systemimgconf;semodule -X 300 -i my-Systemimgconf.pp"
/bin/bash
-
/bin/bash
-
/bin/bash
-
/tmp/linux_386.elf
-
/usr/bin/bash
bash -c "echo \"*/1 * * * * root /.img \" >> /etc/crontab"
/tmp/linux_386.elf
-
/usr/bin/renice
renice -20 6245
/tmp/linux_386.elf
-
/usr/bin/mount
mount -o bind /tmp/ /proc/6245
/tmp/linux_386.elf
-
/usr/sbin/service
service cron start
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/systemctl
systemctl --quiet is-active multi-user.target
/usr/sbin/service
-
/usr/sbin/service
-
/usr/bin/systemctl
systemctl list-unit-files --full --type=socket
/usr/sbin/service
-
/usr/bin/sed
sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
/usr/bin/systemctl
systemctl start cron.service
/tmp/linux_386.elf
-
/usr/bin/systemctl
systemctl start crond.service
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/boot/System.img.config
/boot/System.img.config
/boot/System.img.config
-
/usr/bin/pkill
pkill -9 32678
/boot/System.img.config
-
/usr/bin/sh
sh -c /etc/32678&
/usr/bin/sh
-
/etc/32678
/etc/32678
/etc/32678
-
/usr/bin/sleep
sleep 60
/etc/32678
-
/etc/id.services.conf
/etc/id.services.conf
/etc/id.services.conf
-
/usr/bin/pkill
pkill -9 32678
/etc/id.services.conf
-
/usr/bin/sh
sh -c /etc/32678&
/usr/bin/sh
-
/etc/32678
/etc/32678
/etc/32678
-
/usr/bin/sleep
sleep 60
/etc/id.services.conf
-
/usr/sbin/service
service crond start
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/systemctl
systemctl --quiet is-active multi-user.target
/usr/sbin/service
-
/usr/sbin/service
-
/usr/bin/systemctl
systemctl list-unit-files --full --type=socket
/usr/sbin/service
-
/usr/bin/sed
sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
/usr/bin/systemctl
systemctl start crond.service
/etc/id.services.conf
-
/etc/id.services.conf
/etc/id.services.conf
/boot/System.img.config
-
/usr/sbin/service
service crond start
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/basename
basename /usr/sbin/service
/usr/sbin/service
-
/usr/bin/systemctl
systemctl --quiet is-active multi-user.target
/usr/sbin/service
-
/usr/sbin/service
-
/usr/bin/systemctl
systemctl list-unit-files --full --type=socket
/usr/sbin/service
-
/usr/bin/sed
sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
/usr/bin/systemctl
systemctl start crond.service
/boot/System.img.config
-
/boot/System.img.config
/boot/System.img.config
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-
/usr/lib/udisks2/udisksd
-
/usr/sbin/dumpe2fs
dumpe2fs -h /dev/dm-0
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-
/usr/lib/systemd/systemd
-
/usr/sbin/cron
/usr/sbin/cron -f
/usr/sbin/cron
-
/usr/sbin/cron
-
/bin/sh
/bin/sh -c "/.img "
/bin/sh
-
/usr/sbin/cron
-
/usr/sbin/cron
-
/bin/sh
/bin/sh -c " [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi"
/usr/lib/systemd/systemd
-
/usr/sbin/cron
/usr/sbin/cron -f
There are 133 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.baidu.com/search/spider.html)
unknown
http://search.msn.com/msnbot.htm
unknown
http://154.12.82.11:808/password.txt
154.12.82.11
http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829
unknown
https://www.so.com/s?q=index
unknown
http://help.yahoo.com/help/us/ysearch/slurp)x509:
unknown
http://www.google.com/mobile/adsbot.html)
unknown
http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0
unknown
http://www.baidu.com/search/spider.html)http2:
unknown
http://yandex.com/bots)http:
unknown
http://www.baidu.com/search/spider.html)Mozilla/5.0
unknown
http://www.entireweb.com/about/search_tech/speedy_spider/)text/html
unknown
http://www.haosou.com/help/help_3_2.htmlMozilla/5.0
unknown
https://www.baidu.com/s?wd=insufficient
unknown
http://www.youdao.com/help/webmaster/spider/;)reflect:
unknown
https://search.yahoo.com/search?p=illegal
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.184.228

IPs

IP
Domain
Country
Malicious
154.12.82.11
unknown
United States
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
e7dbc000
page read and write
ffca4000
page read and write
f7f94000
page read and write
f7f98000
page execute read
ffd99000
page read and write
f7f9e000
page execute read
a400000
page read and write
ffdb6000
page read and write
856d000
page read and write
856d000
page read and write
e7d71000
page read and write
fff15000
page read and write
9800000
page read and write
ff97d000
page read and write
82df000
page execute read
82df000
page execute read
82df000
page execute read
e7d66000
page read and write
82df000
page execute read
e7d87000
page read and write
f7fa5000
page read and write
82df000
page execute read
854a000
page read and write
854a000
page read and write
854a000
page read and write
856d000
page read and write
854a000
page read and write
856d000
page read and write
f7fa9000
page execute read
f7fbf000
page execute read
854a000
page read and write
a400000
page read and write
f7ff0000
page read and write
f7f9a000
page read and write
f7ff4000
page execute read
856d000
page read and write
f7fbb000
page read and write
9400000
page read and write
a000000
page read and write
e7d60000
page read and write
There are 30 hidden memdumps, click here to show them.