IOC Report
na.elf

loading gifFilesProcessesURLsDomainsIPsMemdumps321020102Label

Files

File Path
Type
Category
Malicious
Download
na.elf
ELF 32-bit MSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, for GNU/Linux 3.2.0, BuildID[sha1]=bc565f9f2dafc5618defa8eccf705f85712c87da, stripped
initial sample
malicious
/etc/CommId
ASCII text, with no line terminators
dropped
malicious
/usr/sbin/uplugplay
ELF 32-bit MSB executable, MIPS, MIPS32 rel2 version 1 (SYSV), statically linked, for GNU/Linux 3.2.0, BuildID[sha1]=bc565f9f2dafc5618defa8eccf705f85712c87da, stripped
dropped
malicious
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/proc/6418/task/6419/comm
ASCII text, with no line terminators
dropped
/proc/6418/task/6420/comm
ASCII text, with no line terminators
dropped
/proc/6418/task/6421/comm
ASCII text, with no line terminators
dropped
/usr/lib/systemd/system/uplugplay.service
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep na.elf"
/bin/sh
-
/usr/bin/pgrep
pgrep na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pidof na.elf"
/bin/sh
-
/usr/bin/pidof
pidof na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep uplugplay"
/bin/sh
-
/usr/bin/pgrep
pgrep uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pidof uplugplay"
/bin/sh
-
/usr/bin/pidof
pidof uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pgrep upnpsetup"
/bin/sh
-
/usr/bin/pgrep
pgrep upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "pidof upnpsetup"
/bin/sh
-
/usr/bin/pidof
pidof upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "systemctl daemon-reload"
/bin/sh
-
/usr/bin/systemctl
systemctl daemon-reload
/tmp/na.elf
-
/bin/sh
sh -c "systemctl enable uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl enable uplugplay.service
/tmp/na.elf
-
/bin/sh
sh -c "systemctl start uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl start uplugplay.service
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay
/usr/sbin/uplugplay
-
/usr/sbin/uplugplay
-
/bin/sh
sh -c "/usr/sbin/uplugplay -Dcomsvc"
/bin/sh
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay -Dcomsvc
/usr/sbin/uplugplay
-
/bin/sh
sh -c "nslookup p3.feefreepool.net 8.8.8.8"
/bin/sh
-
/usr/bin/nslookup
nslookup p3.feefreepool.net 8.8.8.8
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.xcHQrzuDMU /tmp/tmp.KMipKbsEVZ /tmp/tmp.YDEPSFXP9h
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.xcHQrzuDMU /tmp/tmp.KMipKbsEVZ /tmp/tmp.YDEPSFXP9h
There are 46 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rg
unknown
https://bugs.launchpad.net/ubuntu/
unknown
http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi
unknown
http://p3.feefreepool.net/cgi-bin/prometei.cgi
unknown
https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi?r=0&auth=hash&i=%s&enckey=%shttp://%s/cgi-bin/prometei.cgi%m%d%yxinch
unknown
https://http:///:.onion.i2p.zeroGET
unknown
http://dummy.zero/cgi-bin/prometei.cgi
unknown
http://%s/cgi-bin/prometei.cgi?r=0&auth=hash&i=%s&enckey=%s
unknown

Domains

Name
IP
Malicious
p3.feefreepool.net
88.198.246.242

IPs

IP
Domain
Country
Malicious
88.198.246.242
p3.feefreepool.net
Germany
34.249.145.219
unknown
United States
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
7fced526a000
page read and write
malicious
7fced44d2000
page execute read
malicious
7f23183a0000
page read and write
7f2318c93000
page read and write
7fcf59185000
page read and write
7fcf59162000
page read and write
55d39144a000
page execute read
7f23180e2000
page read and write
7fcf58176000
page read and write
7f23180f0000
page read and write
7fcf4ddf7000
page execute and read and write
7fcf4edf9000
page execute and read and write
558529932000
page execute and read and write
7fcf596b4000
page read and write
7f2318e09000
page read and write
7fcf582fb000
page read and write
7fff1bc93000
page read and write
7fcf505fc000
page execute and read and write
7fcf5982a000
page read and write
7f2318dbc000
page read and write
7fcf597dd000
page read and write
7f2318741000
page read and write
55d393bdb000
page read and write
7fcf581b7000
page read and write
55852792a000
page read and write
558527934000
page read and write
7fcf515fe000
page execute and read and write
7fcf581f8000
page read and write
7f229126a000
page read and write
55d3916d2000
page read and write
7ffd4af40000
page read and write
7fcf594d3000
page read and write
7fcf4e5f8000
page execute and read and write
7fcf58239000
page read and write
7f23178da000
page read and write
7fcf597e5000
page read and write
7f2310000000
page read and write
7fcf52600000
page execute and read and write
7fcf4f5fa000
page execute and read and write
7fcf52621000
page read and write
7fced44e7000
page read and write
5585276a2000
page execute read
7fcf58dc1000
page read and write
7fcf591a2000
page read and write
7f2318764000
page read and write
558529949000
page read and write
55d3936da000
page execute and read and write
7fcf54000000
page read and write
7fcf54021000
page read and write
7fced0032000
page read and write
7fcf58135000
page read and write
7fcf58b11000
page read and write
7f2318dc4000
page read and write
55d3936f1000
page read and write
7f2310021000
page read and write
7fcf51dff000
page execute and read and write
7fcf58b03000
page read and write
7fcf50dfd000
page execute and read and write
7f2318ab2000
page read and write
7fcf537ff000
page execute and read and write
7fff1bcb4000
page execute read
7f2318781000
page read and write
7ffd4afbd000
page execute read
55852a4b8000
page read and write
7fcf52ffe000
page execute and read and write
7fcf4fdfb000
page execute and read and write
7fcecc062000
page read and write
55d3916dc000
page read and write
There are 58 hidden memdumps, click here to show them.