Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1665691
MD5:3c66d08596e581fc2481406e7ac98206
SHA1:72c5a050386759ac4c869466a6b8b03327f1348e
SHA256:f05d22b4c1b8e77e1122b13b677905d38b13f45c7c9541942143878544ca586a
Tags:elfuser-abuse_ch
Infos:

Detection

Prometei
Score:88
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Prometei
Drops files in suspicious directories
Executes the "crontab" command typically for achieving persistence
Sample is packed with UPX
Sample tries to persist itself using cron
Creates hidden files and/or directories
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "pgrep" command search for and/or send signals to processes
Executes the "rm" command used to delete files or directories
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads CPU information from /sys indicative of miner or evasive malware
Sample contains only a LOAD segment without any section mappings
Sample tries to set the executable flag
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1665691
Start date and time:2025-04-15 18:53:18 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal88.troj.evad.linELF@0/6@0/0
  • Report size exceeded maximum capacity and may have missing behavior information.
Command:/tmp/na.elf
PID:6230
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Starting...
System install...OK
Standard Error:Created symlink /etc/systemd/system/multi-user.target.wants/uplugplay.service /lib/systemd/system/uplugplay.service.
Job for uplugplay.service failed because the control process exited with error code.
See "systemctl status uplugplay.service" and "journalctl -xe" for details.
no crontab for root
  • system is lnxubuntu20
  • dash New Fork (PID: 6210, Parent: 4331)
  • rm (PID: 6210, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.uzygl09kcR /tmp/tmp.fGR07bdfVm /tmp/tmp.DnWMxOcIFx
  • dash New Fork (PID: 6211, Parent: 4331)
  • cat (PID: 6211, Parent: 4331, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.uzygl09kcR
  • dash New Fork (PID: 6212, Parent: 4331)
  • head (PID: 6212, Parent: 4331, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 6213, Parent: 4331)
  • tr (PID: 6213, Parent: 4331, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 6214, Parent: 4331)
  • cut (PID: 6214, Parent: 4331, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 6215, Parent: 4331)
  • cat (PID: 6215, Parent: 4331, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.uzygl09kcR
  • dash New Fork (PID: 6216, Parent: 4331)
  • head (PID: 6216, Parent: 4331, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 6217, Parent: 4331)
  • tr (PID: 6217, Parent: 4331, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 6218, Parent: 4331)
  • cut (PID: 6218, Parent: 4331, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 6219, Parent: 4331)
  • rm (PID: 6219, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.uzygl09kcR /tmp/tmp.fGR07bdfVm /tmp/tmp.DnWMxOcIFx
  • na.elf (PID: 6230, Parent: 6145, MD5: 3c66d08596e581fc2481406e7ac98206) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 6233, Parent: 6230)
    • sh (PID: 6233, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep na.elf"
      • sh New Fork (PID: 6234, Parent: 6233)
      • pgrep (PID: 6234, Parent: 6233, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep na.elf
    • na.elf New Fork (PID: 6239, Parent: 6230)
    • sh (PID: 6239, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof na.elf"
      • sh New Fork (PID: 6240, Parent: 6239)
      • pidof (PID: 6240, Parent: 6239, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof na.elf
    • na.elf New Fork (PID: 6243, Parent: 6230)
    • sh (PID: 6243, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep uplugplay"
      • sh New Fork (PID: 6244, Parent: 6243)
      • pgrep (PID: 6244, Parent: 6243, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep uplugplay
    • na.elf New Fork (PID: 6247, Parent: 6230)
    • sh (PID: 6247, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep upnpsetup"
      • sh New Fork (PID: 6248, Parent: 6247)
      • pgrep (PID: 6248, Parent: 6247, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep upnpsetup
    • na.elf New Fork (PID: 6253, Parent: 6230)
    • sh (PID: 6253, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof upnpsetup"
      • sh New Fork (PID: 6254, Parent: 6253)
      • pidof (PID: 6254, Parent: 6253, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof upnpsetup
    • na.elf New Fork (PID: 6256, Parent: 6230)
    • sh (PID: 6256, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl daemon-reload"
      • sh New Fork (PID: 6257, Parent: 6256)
      • systemctl (PID: 6257, Parent: 6256, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl daemon-reload
    • na.elf New Fork (PID: 6272, Parent: 6230)
    • sh (PID: 6272, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl enable uplugplay.service"
      • sh New Fork (PID: 6273, Parent: 6272)
      • systemctl (PID: 6273, Parent: 6272, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl enable uplugplay.service
    • na.elf New Fork (PID: 6280, Parent: 6230)
    • sh (PID: 6280, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl start uplugplay.service"
      • sh New Fork (PID: 6281, Parent: 6280)
      • systemctl (PID: 6281, Parent: 6280, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl start uplugplay.service
    • na.elf New Fork (PID: 6324, Parent: 6230)
    • sh (PID: 6324, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab -l"
      • sh New Fork (PID: 6325, Parent: 6324)
      • crontab (PID: 6325, Parent: 6324, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -l
    • na.elf New Fork (PID: 6331, Parent: 6230)
    • sh (PID: 6331, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab task.cron"
      • sh New Fork (PID: 6332, Parent: 6331)
      • crontab (PID: 6332, Parent: 6331, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab task.cron
    • na.elf New Fork (PID: 6336, Parent: 6230)
    • sh (PID: 6336, Parent: 6230, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab -l"
      • sh New Fork (PID: 6337, Parent: 6336)
      • crontab (PID: 6337, Parent: 6336, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -l
    • na.elf New Fork (PID: 6338, Parent: 6230)
      • na.elf New Fork (PID: 6340, Parent: 6338)
      • sh (PID: 6340, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6341, Parent: 6340)
        • sh (PID: 6341, Parent: 6340, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6344, Parent: 6338)
      • sh (PID: 6344, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6345, Parent: 6344)
        • pgrep (PID: 6345, Parent: 6344, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6350, Parent: 6338)
      • sh (PID: 6350, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6351, Parent: 6350)
        • pidof (PID: 6351, Parent: 6350, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6354, Parent: 6338)
      • sh (PID: 6354, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6355, Parent: 6354)
        • sh (PID: 6355, Parent: 6354, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6358, Parent: 6338)
      • sh (PID: 6358, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6359, Parent: 6358)
        • pgrep (PID: 6359, Parent: 6358, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6362, Parent: 6338)
      • sh (PID: 6362, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6363, Parent: 6362)
        • pidof (PID: 6363, Parent: 6362, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6368, Parent: 6338)
      • sh (PID: 6368, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6369, Parent: 6368)
        • sh (PID: 6369, Parent: 6368, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6372, Parent: 6338)
      • sh (PID: 6372, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6373, Parent: 6372)
        • pgrep (PID: 6373, Parent: 6372, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6376, Parent: 6338)
      • sh (PID: 6376, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6377, Parent: 6376)
        • pidof (PID: 6377, Parent: 6376, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6380, Parent: 6338)
      • sh (PID: 6380, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6381, Parent: 6380)
        • sh (PID: 6381, Parent: 6380, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6384, Parent: 6338)
      • sh (PID: 6384, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6385, Parent: 6384)
        • pgrep (PID: 6385, Parent: 6384, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6388, Parent: 6338)
      • sh (PID: 6388, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6389, Parent: 6388)
        • pidof (PID: 6389, Parent: 6388, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6392, Parent: 6338)
      • sh (PID: 6392, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6393, Parent: 6392)
        • sh (PID: 6393, Parent: 6392, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6396, Parent: 6338)
      • sh (PID: 6396, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6397, Parent: 6396)
        • pgrep (PID: 6397, Parent: 6396, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6400, Parent: 6338)
      • sh (PID: 6400, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6401, Parent: 6400)
        • pidof (PID: 6401, Parent: 6400, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6405, Parent: 6338)
      • sh (PID: 6405, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6406, Parent: 6405)
        • sh (PID: 6406, Parent: 6405, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6409, Parent: 6338)
      • sh (PID: 6409, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6410, Parent: 6409)
        • pgrep (PID: 6410, Parent: 6409, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6413, Parent: 6338)
      • sh (PID: 6413, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6414, Parent: 6413)
        • pidof (PID: 6414, Parent: 6413, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6417, Parent: 6338)
      • sh (PID: 6417, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6418, Parent: 6417)
        • sh (PID: 6418, Parent: 6417, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6421, Parent: 6338)
      • sh (PID: 6421, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6422, Parent: 6421)
        • pgrep (PID: 6422, Parent: 6421, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6427, Parent: 6338)
      • sh (PID: 6427, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6428, Parent: 6427)
        • pidof (PID: 6428, Parent: 6427, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6431, Parent: 6338)
      • sh (PID: 6431, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6432, Parent: 6431)
        • sh (PID: 6432, Parent: 6431, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6435, Parent: 6338)
      • sh (PID: 6435, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6436, Parent: 6435)
        • pgrep (PID: 6436, Parent: 6435, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6439, Parent: 6338)
      • sh (PID: 6439, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6440, Parent: 6439)
        • pidof (PID: 6440, Parent: 6439, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6443, Parent: 6338)
      • sh (PID: 6443, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6444, Parent: 6443)
        • sh (PID: 6444, Parent: 6443, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6447, Parent: 6338)
      • sh (PID: 6447, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6448, Parent: 6447)
        • pgrep (PID: 6448, Parent: 6447, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6451, Parent: 6338)
      • sh (PID: 6451, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6452, Parent: 6451)
        • pidof (PID: 6452, Parent: 6451, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6455, Parent: 6338)
      • sh (PID: 6455, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6456, Parent: 6455)
        • sh (PID: 6456, Parent: 6455, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6459, Parent: 6338)
      • sh (PID: 6459, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6460, Parent: 6459)
        • pgrep (PID: 6460, Parent: 6459, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6463, Parent: 6338)
      • sh (PID: 6463, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6464, Parent: 6463)
        • pidof (PID: 6464, Parent: 6463, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6468, Parent: 6338)
      • sh (PID: 6468, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6469, Parent: 6468)
        • sh (PID: 6469, Parent: 6468, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6472, Parent: 6338)
      • sh (PID: 6472, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6473, Parent: 6472)
        • pgrep (PID: 6473, Parent: 6472, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6477, Parent: 6338)
      • sh (PID: 6477, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6478, Parent: 6477)
        • pidof (PID: 6478, Parent: 6477, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6481, Parent: 6338)
      • sh (PID: 6481, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6482, Parent: 6481)
        • sh (PID: 6482, Parent: 6481, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6485, Parent: 6338)
      • sh (PID: 6485, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6486, Parent: 6485)
        • pgrep (PID: 6486, Parent: 6485, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6489, Parent: 6338)
      • sh (PID: 6489, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6490, Parent: 6489)
        • pidof (PID: 6490, Parent: 6489, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6493, Parent: 6338)
      • sh (PID: 6493, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6496, Parent: 6493)
        • sh (PID: 6496, Parent: 6493, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6499, Parent: 6338)
      • sh (PID: 6499, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6500, Parent: 6499)
        • pgrep (PID: 6500, Parent: 6499, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6503, Parent: 6338)
      • sh (PID: 6503, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6504, Parent: 6503)
        • pidof (PID: 6504, Parent: 6503, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6507, Parent: 6338)
      • sh (PID: 6507, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6508, Parent: 6507)
        • sh (PID: 6508, Parent: 6507, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6511, Parent: 6338)
      • sh (PID: 6511, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6512, Parent: 6511)
        • pgrep (PID: 6512, Parent: 6511, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6517, Parent: 6338)
      • sh (PID: 6517, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6518, Parent: 6517)
        • pidof (PID: 6518, Parent: 6517, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6519, Parent: 6338)
      • sh (PID: 6519, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6520, Parent: 6519)
        • sh (PID: 6520, Parent: 6519, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6525, Parent: 6338)
      • sh (PID: 6525, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6526, Parent: 6525)
        • pgrep (PID: 6526, Parent: 6525, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6529, Parent: 6338)
      • sh (PID: 6529, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6530, Parent: 6529)
        • pidof (PID: 6530, Parent: 6529, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6533, Parent: 6338)
      • sh (PID: 6533, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6534, Parent: 6533)
        • sh (PID: 6534, Parent: 6533, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6537, Parent: 6338)
      • sh (PID: 6537, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6538, Parent: 6537)
        • pgrep (PID: 6538, Parent: 6537, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6541, Parent: 6338)
      • sh (PID: 6541, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6542, Parent: 6541)
        • pidof (PID: 6542, Parent: 6541, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6546, Parent: 6338)
      • sh (PID: 6546, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6547, Parent: 6546)
        • sh (PID: 6547, Parent: 6546, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6550, Parent: 6338)
      • sh (PID: 6550, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6551, Parent: 6550)
        • pgrep (PID: 6551, Parent: 6550, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6554, Parent: 6338)
      • sh (PID: 6554, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6555, Parent: 6554)
        • pidof (PID: 6555, Parent: 6554, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6558, Parent: 6338)
      • sh (PID: 6558, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6559, Parent: 6558)
        • sh (PID: 6559, Parent: 6558, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6562, Parent: 6338)
      • sh (PID: 6562, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6563, Parent: 6562)
        • pgrep (PID: 6563, Parent: 6562, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6566, Parent: 6338)
      • sh (PID: 6566, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6569, Parent: 6566)
        • pidof (PID: 6569, Parent: 6566, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6571, Parent: 6338)
      • sh (PID: 6571, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6572, Parent: 6571)
        • sh (PID: 6572, Parent: 6571, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6577, Parent: 6338)
      • sh (PID: 6577, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6578, Parent: 6577)
        • pgrep (PID: 6578, Parent: 6577, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6581, Parent: 6338)
      • sh (PID: 6581, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6582, Parent: 6581)
        • pidof (PID: 6582, Parent: 6581, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6585, Parent: 6338)
      • sh (PID: 6585, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6586, Parent: 6585)
        • sh (PID: 6586, Parent: 6585, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6589, Parent: 6338)
      • sh (PID: 6589, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6590, Parent: 6589)
        • pgrep (PID: 6590, Parent: 6589, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6593, Parent: 6338)
      • sh (PID: 6593, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6594, Parent: 6593)
        • pidof (PID: 6594, Parent: 6593, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6600, Parent: 6338)
      • sh (PID: 6600, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 6601, Parent: 6600)
        • sh (PID: 6601, Parent: 6600, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh /usr/sbin/uplugplay -Dcomsvc
      • na.elf New Fork (PID: 6604, Parent: 6338)
      • sh (PID: 6604, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep /usr/sbin/uplugplay"
        • sh New Fork (PID: 6606, Parent: 6604)
        • pgrep (PID: 6606, Parent: 6604, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep /usr/sbin/uplugplay
      • na.elf New Fork (PID: 6610, Parent: 6338)
      • sh (PID: 6610, Parent: 6338, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof /usr/sbin/uplugplay"
        • sh New Fork (PID: 6615, Parent: 6610)
        • pidof (PID: 6615, Parent: 6610, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof /usr/sbin/uplugplay
  • systemd New Fork (PID: 6259, Parent: 6258)
  • snapd-env-generator (PID: 6259, Parent: 6258, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • systemd New Fork (PID: 6278, Parent: 6277)
  • snapd-env-generator (PID: 6278, Parent: 6277, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • systemd New Fork (PID: 6282, Parent: 1)
  • cleanup
SourceRuleDescriptionAuthorStrings
na.elfLinux_Trojan_Dofloo_ac3333d1unknownunknown
  • 0x5bcdb:$a: 76 77 78 95 5C C9 95 79 7A C9 95 5C C9 41 42 43 5C C9 95 5C 44 45
SourceRuleDescriptionAuthorStrings
/usr/sbin/uplugplayLinux_Trojan_Dofloo_ac3333d1unknownunknown
  • 0x5bcdb:$a: 76 77 78 95 5C C9 95 79 7A C9 95 5C C9 41 42 43 5C C9 95 5C 44 45
SourceRuleDescriptionAuthorStrings
6230.1.0000000000401000.00000000004f9000.r-x.sdmpLinux_Hacktool_Flooder_1a4eb229unknownunknown
  • 0x9beb:$a: F4 8B 45 E8 83 C0 01 89 45 F8 EB 0F 8B 45 E8 83 C0 01 89 45 F4 8B
6230.1.0000000000401000.00000000004f9000.r-x.sdmpLinux_Hacktool_Flooder_f454ec10unknownunknown
  • 0xb569:$a: 8B 45 EC 48 63 D0 48 8B 45 D0 48 01 D0 0F B6 00 3C 2E 75 4D 8B
Process Memory Space: na.elf PID: 6230JoeSecurity_Prometei_1Yara detected PrometeiJoe Security
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: na.elfAvira: detected
    Source: na.elfVirustotal: Detection: 38%Perma Link
    Source: na.elfReversingLabs: Detection: 50%

    Bitcoin Miner

    barindex
    Source: Yara matchFile source: Process Memory Space: na.elf PID: 6230, type: MEMORYSTR
    Source: /usr/bin/pgrep (PID: 6234)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6244)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6248)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6345)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6359)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6385)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6397)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6410)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6422)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6436)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6448)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6460)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6473)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6486)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6500)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6512)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6526)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6538)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6551)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6563)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6578)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6590)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6606)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
    Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
    Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: na.elf, uplugplay.32.drString found in binary or memory: http://152.36.128
    Source: na.elf, uplugplay.32.drString found in binary or memory: http://upx.sf.net
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

    System Summary

    barindex
    Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Dofloo_ac3333d1 Author: unknown
    Source: 6230.1.0000000000401000.00000000004f9000.r-x.sdmp, type: MEMORYMatched rule: Linux_Hacktool_Flooder_1a4eb229 Author: unknown
    Source: 6230.1.0000000000401000.00000000004f9000.r-x.sdmp, type: MEMORYMatched rule: Linux_Hacktool_Flooder_f454ec10 Author: unknown
    Source: /usr/sbin/uplugplay, type: DROPPEDMatched rule: Linux_Trojan_Dofloo_ac3333d1 Author: unknown
    Source: LOAD without section mappingsProgram segment: 0x400000
    Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Dofloo_ac3333d1 severity = 100, os = linux, arch_context = x86, creation_date = 2022-01-05, scan_context = file, memory, reference = 04664dc5ea14ddff5301e66c46d6795f1582c148b5cb621248424d015245c95e, license = Elastic License v2, threat_name = Linux.Trojan.Dofloo, fingerprint = a8f360e2a545e65b5f9f2273715c1a5008a0fe4f88f6e14becd6e69158aab409, id = ac3333d1-df88-459b-a411-00b4fc947f3f, last_modified = 2022-01-26
    Source: 6230.1.0000000000401000.00000000004f9000.r-x.sdmp, type: MEMORYMatched rule: Linux_Hacktool_Flooder_1a4eb229 reference_sample = bf6f3ffaf94444a09b69cbd4c8c0224d7eb98eb41514bdc3f58c1fb90ac0e705, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Hacktool.Flooder, fingerprint = de076ef23c2669512efc00ddfe926ef04f8ad939061c69131a0ef9a743639371, id = 1a4eb229-a194-46a5-8e93-370a40ba999b, last_modified = 2021-09-16
    Source: 6230.1.0000000000401000.00000000004f9000.r-x.sdmp, type: MEMORYMatched rule: Linux_Hacktool_Flooder_f454ec10 severity = 100, os = linux, arch_context = x86, creation_date = 2022-01-05, scan_context = file, memory, reference = 0297e1ad6e180af85256a175183102776212d324a2ce0c4f32e8a44a2e2e9dad, license = Elastic License v2, threat_name = Linux.Hacktool.Flooder, fingerprint = 2ae5e2c3190a4ce5d238efdb10ac0520987425fb7af52246b6bf948abd0259da, id = f454ec10-7a67-4717-9e95-fecb7c357566, last_modified = 2022-01-26
    Source: /usr/sbin/uplugplay, type: DROPPEDMatched rule: Linux_Trojan_Dofloo_ac3333d1 severity = 100, os = linux, arch_context = x86, creation_date = 2022-01-05, scan_context = file, memory, reference = 04664dc5ea14ddff5301e66c46d6795f1582c148b5cb621248424d015245c95e, license = Elastic License v2, threat_name = Linux.Trojan.Dofloo, fingerprint = a8f360e2a545e65b5f9f2273715c1a5008a0fe4f88f6e14becd6e69158aab409, id = ac3333d1-df88-459b-a411-00b4fc947f3f, last_modified = 2022-01-26
    Source: classification engineClassification label: mal88.troj.evad.linELF@0/6@0/0

    Data Obfuscation

    barindex
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Id: UPX 4.24 Copyright (C) 1996-2024 the UPX Team. All Rights Reserved. $

    Persistence and Installation Behavior

    barindex
    Source: /bin/sh (PID: 6325)Crontab executable: /usr/bin/crontab -> crontab -lJump to behavior
    Source: /bin/sh (PID: 6332)Crontab executable: /usr/bin/crontab -> crontab task.cronJump to behavior
    Source: /bin/sh (PID: 6337)Crontab executable: /usr/bin/crontab -> crontab -lJump to behavior
    Source: /usr/bin/crontab (PID: 6332)File: /var/spool/cron/crontabs/tmp.SNf3cYJump to behavior
    Source: /usr/bin/crontab (PID: 6332)File: /var/spool/cron/crontabs/rootJump to behavior
    Source: /usr/bin/pidof (PID: 6240)Directory: //.Jump to behavior
    Source: /usr/bin/pidof (PID: 6254)Directory: //.Jump to behavior
    Source: /usr/bin/pidof (PID: 6351)Directory: //.Jump to behavior
    Source: /usr/bin/pidof (PID: 6363)Directory: //.Jump to behavior
    Source: /usr/bin/pidof (PID: 6377)Directory: //.Jump to behavior
    Source: /usr/bin/pidof (PID: 6389)Directory: //.Jump to behavior
    Source: /usr/bin/pidof (PID: 6401)Directory: //.Jump to behavior
    Source: /usr/bin/pidof (PID: 6414)Directory: //.
    Source: /usr/bin/pidof (PID: 6428)Directory: //.
    Source: /usr/bin/pidof (PID: 6440)Directory: //.
    Source: /usr/bin/pidof (PID: 6452)Directory: //.
    Source: /usr/bin/pidof (PID: 6464)Directory: //.
    Source: /usr/bin/pidof (PID: 6478)Directory: //.
    Source: /usr/bin/pidof (PID: 6490)Directory: //.
    Source: /usr/bin/pidof (PID: 6504)Directory: //.
    Source: /usr/bin/pidof (PID: 6518)Directory: //.
    Source: /usr/bin/pidof (PID: 6530)Directory: //.
    Source: /usr/bin/pidof (PID: 6542)Directory: //.
    Source: /usr/bin/pidof (PID: 6555)Directory: //.
    Source: /usr/bin/pidof (PID: 6569)Directory: //.
    Source: /usr/bin/pidof (PID: 6582)Directory: //.
    Source: /usr/bin/pidof (PID: 6594)Directory: //.
    Source: /usr/bin/pidof (PID: 6615)Directory: //.
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1582/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1582/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/3088/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/3088/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/230/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/230/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/110/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/110/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/231/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/231/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/111/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/111/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/232/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/232/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1579/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1579/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/112/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/112/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/233/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/233/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1699/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1699/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/113/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/113/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/234/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/234/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1335/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1335/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1698/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1698/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/114/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/114/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/235/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/235/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1334/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1334/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1576/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1576/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/2302/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/2302/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/115/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/115/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/236/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/236/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/116/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/116/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/237/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/237/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/117/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/117/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/118/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/118/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/910/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/910/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/119/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/119/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/912/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/912/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/10/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/10/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/2307/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/2307/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/11/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/11/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/918/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/918/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/12/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/12/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/13/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/13/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/14/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/14/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/15/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/15/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/16/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/16/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/17/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/17/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/18/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/18/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1594/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1594/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/120/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/120/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/121/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/121/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1349/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1349/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/1/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/122/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/122/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/243/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/243/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/123/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/123/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/2/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/2/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/124/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/124/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/3/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/3/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/4/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/4/cmdlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/125/statusJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)File opened: /proc/125/cmdlineJump to behavior
    Source: /tmp/na.elf (PID: 6233)Shell command executed: sh -c "pgrep na.elf"Jump to behavior
    Source: /tmp/na.elf (PID: 6239)Shell command executed: sh -c "pidof na.elf"Jump to behavior
    Source: /tmp/na.elf (PID: 6243)Shell command executed: sh -c "pgrep uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6247)Shell command executed: sh -c "pgrep upnpsetup"Jump to behavior
    Source: /tmp/na.elf (PID: 6253)Shell command executed: sh -c "pidof upnpsetup"Jump to behavior
    Source: /tmp/na.elf (PID: 6256)Shell command executed: sh -c "systemctl daemon-reload"Jump to behavior
    Source: /tmp/na.elf (PID: 6272)Shell command executed: sh -c "systemctl enable uplugplay.service"Jump to behavior
    Source: /tmp/na.elf (PID: 6280)Shell command executed: sh -c "systemctl start uplugplay.service"Jump to behavior
    Source: /tmp/na.elf (PID: 6324)Shell command executed: sh -c "crontab -l"Jump to behavior
    Source: /tmp/na.elf (PID: 6331)Shell command executed: sh -c "crontab task.cron"Jump to behavior
    Source: /tmp/na.elf (PID: 6336)Shell command executed: sh -c "crontab -l"Jump to behavior
    Source: /tmp/na.elf (PID: 6340)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"Jump to behavior
    Source: /tmp/na.elf (PID: 6344)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6350)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6354)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"Jump to behavior
    Source: /tmp/na.elf (PID: 6358)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6362)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6368)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"Jump to behavior
    Source: /tmp/na.elf (PID: 6372)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6376)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6380)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"Jump to behavior
    Source: /tmp/na.elf (PID: 6384)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6388)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6392)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"Jump to behavior
    Source: /tmp/na.elf (PID: 6396)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6400)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"Jump to behavior
    Source: /tmp/na.elf (PID: 6405)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6409)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6413)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6417)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6421)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6427)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6431)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6435)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6439)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6443)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6447)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6451)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6455)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6459)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6463)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6468)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6472)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6477)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6481)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6485)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6489)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6493)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6499)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6503)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6507)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6511)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6517)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6519)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6525)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6529)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6533)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6537)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6541)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6546)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6550)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6554)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6558)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6562)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6566)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6571)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6577)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6581)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6585)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6589)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6593)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6600)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"
    Source: /tmp/na.elf (PID: 6604)Shell command executed: sh -c "pgrep /usr/sbin/uplugplay"
    Source: /tmp/na.elf (PID: 6610)Shell command executed: sh -c "pidof /usr/sbin/uplugplay"
    Source: /bin/sh (PID: 6234)Pgrep executable: /usr/bin/pgrep -> pgrep na.elfJump to behavior
    Source: /bin/sh (PID: 6244)Pgrep executable: /usr/bin/pgrep -> pgrep uplugplayJump to behavior
    Source: /bin/sh (PID: 6248)Pgrep executable: /usr/bin/pgrep -> pgrep upnpsetupJump to behavior
    Source: /bin/sh (PID: 6345)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplayJump to behavior
    Source: /bin/sh (PID: 6359)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplayJump to behavior
    Source: /bin/sh (PID: 6373)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplayJump to behavior
    Source: /bin/sh (PID: 6385)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplayJump to behavior
    Source: /bin/sh (PID: 6397)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplayJump to behavior
    Source: /bin/sh (PID: 6410)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6422)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6436)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6448)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6460)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6473)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6486)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6500)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6512)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6526)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6538)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6551)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6563)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6578)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6590)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /bin/sh (PID: 6606)Pgrep executable: /usr/bin/pgrep -> pgrep /usr/sbin/uplugplay
    Source: /usr/bin/dash (PID: 6210)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.uzygl09kcR /tmp/tmp.fGR07bdfVm /tmp/tmp.DnWMxOcIFxJump to behavior
    Source: /usr/bin/dash (PID: 6219)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.uzygl09kcR /tmp/tmp.fGR07bdfVm /tmp/tmp.DnWMxOcIFxJump to behavior
    Source: /bin/sh (PID: 6257)Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reloadJump to behavior
    Source: /bin/sh (PID: 6273)Systemctl executable: /usr/bin/systemctl -> systemctl enable uplugplay.serviceJump to behavior
    Source: /bin/sh (PID: 6281)Systemctl executable: /usr/bin/systemctl -> systemctl start uplugplay.serviceJump to behavior
    Source: /tmp/na.elf (PID: 6230)File: /usr/sbin/uplugplay (bits: -v usr: x grp: x all: r)Jump to behavior
    Source: submitted sampleStderr: Created symlink /etc/systemd/system/multi-user.target.wants/uplugplay.service /lib/systemd/system/uplugplay.service.Job for uplugplay.service failed because the control process exited with error code.See "systemctl status uplugplay.service" and "journalctl -xe" for details.no crontab for root: exit code = 0

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: /tmp/na.elf (PID: 6230)File: /usr/sbin/uplugplayJump to dropped file
    Source: na.elfSubmission file: segment LOAD with 7.6054 entropy (max. 8.0)
    Source: na.elfSubmission file: segment LOAD with 7.943 entropy (max. 8.0)
    Source: /usr/bin/pgrep (PID: 6234)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6244)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6248)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6345)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6359)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6373)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6385)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6397)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: /usr/bin/pgrep (PID: 6410)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6422)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6436)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6448)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6460)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6473)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6486)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6500)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6512)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6526)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6538)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6551)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6563)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6578)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6590)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /usr/bin/pgrep (PID: 6606)Reads CPU info from /sys: /sys/devices/system/cpu/online
    Source: /tmp/na.elf (PID: 6230)Queries kernel information via 'uname': Jump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid Accounts1
    Scheduled Task/Job
    1
    Systemd Service
    1
    Systemd Service
    1
    Masquerading
    1
    OS Credential Dumping
    1
    Security Software Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    1
    File and Directory Permissions Modification
    LSASS Memory1
    System Information Discovery
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    Scripting
    Logon Script (Windows)1
    Hidden Files and Directories
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    File Deletion
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1665691 Sample: na.elf Startdate: 15/04/2025 Architecture: LINUX Score: 88 65 109.202.202.202, 80 INIT7CH Switzerland 2->65 67 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->67 69 91.189.91.43, 443 CANONICAL-ASGB United Kingdom 2->69 75 Malicious sample detected (through community Yara rule) 2->75 77 Antivirus / Scanner detection for submitted sample 2->77 79 Multi AV Scanner detection for submitted file 2->79 81 2 other signatures 2->81 9 dash rm na.elf 2->9         started        13 dash rm 2->13         started        15 dash cut 2->15         started        17 10 other processes 2->17 signatures3 process4 file5 63 /usr/sbin/uplugplay, DOS 9->63 dropped 83 Drops files in suspicious directories 9->83 19 na.elf 9->19         started        21 na.elf sh 9->21         started        23 na.elf sh 9->23         started        25 9 other processes 9->25 signatures6 process7 process8 27 na.elf sh 19->27         started        29 na.elf sh 19->29         started        31 na.elf sh 19->31         started        43 60 other processes 19->43 33 sh crontab 21->33         started        37 sh crontab 23->37         started        39 sh crontab 25->39         started        41 sh pgrep 25->41         started        45 7 other processes 25->45 file9 47 sh sh 27->47         started        49 sh pgrep 29->49         started        51 sh pidof 31->51         started        61 /var/spool/cron/crontabs/tmp.SNf3cY, ASCII 33->61 dropped 71 Sample tries to persist itself using cron 33->71 73 Executes the "crontab" command typically for achieving persistence 33->73 53 sh sh 43->53         started        55 sh sh 43->55         started        57 sh sh 43->57         started        59 57 other processes 43->59 signatures10 process11
    SourceDetectionScannerLabelLink
    na.elf38%VirustotalBrowse
    na.elf50%ReversingLabsLinux.Trojan.Generic
    na.elf100%AviraLINUX/GM.Agent.JQ
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netna.elf, uplugplay.32.drfalse
      high
      http://152.36.128na.elf, uplugplay.32.drfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        109.202.202.202
        unknownSwitzerland
        13030INIT7CHfalse
        91.189.91.43
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        91.189.91.42
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
        • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
        91.189.91.43boatnet.x86.elfGet hashmaliciousMiraiBrowse
          boatnet.mips.elfGet hashmaliciousMiraiBrowse
            boatnet.arm5.elfGet hashmaliciousUnknownBrowse
              boatnet.x86.elfGet hashmaliciousMiraiBrowse
                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                  boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                    boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        sshd.elfGet hashmaliciousUnknownBrowse
                          gY2rWwaH7T.elfGet hashmaliciousUnknownBrowse
                            91.189.91.42boatnet.x86.elfGet hashmaliciousMiraiBrowse
                              boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                boatnet.arm5.elfGet hashmaliciousUnknownBrowse
                                  boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                    boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                      boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                        boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            sshd.elfGet hashmaliciousUnknownBrowse
                                              gY2rWwaH7T.elfGet hashmaliciousUnknownBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CANONICAL-ASGBboatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                boatnet.arm5.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 185.125.190.26
                                                boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 185.125.190.26
                                                CANONICAL-ASGBboatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                boatnet.arm5.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 185.125.190.26
                                                boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 185.125.190.26
                                                INIT7CHboatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                • 109.202.202.202
                                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                • 109.202.202.202
                                                boatnet.arm5.elfGet hashmaliciousUnknownBrowse
                                                • 109.202.202.202
                                                boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                • 109.202.202.202
                                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                • 109.202.202.202
                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                • 109.202.202.202
                                                boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                sshd.elfGet hashmaliciousUnknownBrowse
                                                • 109.202.202.202
                                                gY2rWwaH7T.elfGet hashmaliciousUnknownBrowse
                                                • 109.202.202.202
                                                No context
                                                No context
                                                Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):76
                                                Entropy (8bit):3.7627880354948586
                                                Encrypted:false
                                                SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                                                MD5:D86A1F5765F37989EB0EC3837AD13ECC
                                                SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                                                SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                                                SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                                                Process:/tmp/na.elf
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):34
                                                Entropy (8bit):4.175123135113461
                                                Encrypted:false
                                                SSDEEP:3:SH3WmNJX41v:SH3DNdy
                                                MD5:2B537943AA88194A6F2305016C592614
                                                SHA1:8DCD26C779E7717E488F58A0AEB3D8B28B6ECD5A
                                                SHA-256:39FC917D476C4AB57F6E9CA05D2B9E4AB792B5EEF83B3266AED9F5312953BC43
                                                SHA-512:46526F98277DE6F786F20F8742BC4AE8B55F287B9E768F1DD1F08819571621045AEF99397BAC1F5946288FFDC18EE78F1CECC22466285F92A156218E5AC985A9
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:@reboot /usr/sbin/uplugplay -cron.
                                                Process:/tmp/na.elf
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):145
                                                Entropy (8bit):4.769509838572339
                                                Encrypted:false
                                                SSDEEP:3:zMZa75X1PxQJqtWA1+DRvBADMikAdIgQ+aQmNJX4ev+sirSkQmWA1+DRvn:z8uXcqtWA4RZAMD+aBNdhTILQmWA4Rv
                                                MD5:8CA62D1F47880BCE036C2956C9B7B272
                                                SHA1:3BCC3A5C4FCC5B0D08C4524A59F6B8E113B62060
                                                SHA-256:C655D3D4E374FAD38313EC4262207B2D7D68A870238F203EF3C33F85E66C8E32
                                                SHA-512:4CD2D9D67151FA25E833707DEE2442C4A5F752053FC2C36EC73C0E2B734C66CA69C63FCEB47714D9ADD5B9FE2EEE1E45BE5199E2CAE7C26173E766B333877DA6
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:[Unit].Description=UPlugPlay.After=multi-user.target..[Service].Type=forking.ExecStart=/usr/sbin/uplugplay..[Install].WantedBy=multi-user.target.
                                                Process:/tmp/na.elf
                                                File Type:DOS 2.0 backup id file, sequence 50
                                                Category:dropped
                                                Size (bytes):435932
                                                Entropy (8bit):7.94281509816414
                                                Encrypted:false
                                                SSDEEP:6144:/3fxS1fHETSACF2Gzm5DVvSHrKKRH4SCra+HWMiFbcAOXmb4Dsi6wwcitgq:v5WOSACZSV6eKRH5EPiamb4DsDwwc6
                                                MD5:6C4B46E518248AAB0D15009BE8E9BA85
                                                SHA1:51504DC4F140499B12CE3FC19B2259CF169F156C
                                                SHA-256:846AD247D4DFF5C630CC9E9A52448E16CFA38969825C6D77BE948CEF750ABA32
                                                SHA-512:8A2A1D8699DFF90C6702607E672C185107C398FFADB8635EC3594605E8B36715A241F3976867BF32F0093BCC316BAC569E3F3A84F0624407870BB84B062D17D5
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: Linux_Trojan_Dofloo_ac3333d1, Description: unknown, Source: /usr/sbin/uplugplay, Author: unknown
                                                Reputation:low
                                                Preview:6230..............>.....`.].....@...................@.8...........................@.......@.............XH...............................PW......PW.....M.......M...............Q.td....................................................V..9UPX!............!v..p............. ..ELF......>....@.......0..'8..........W.3c..-.......o..K>...@!v..{_bo./.O7.%....o.....l..-.R..XOH....6..o..p..@... ....om.r2...D_..n.D...O...M(.S.td...POQn..PpnG.oRO!..=.0...%I.$...@.P.............y......GNU....'..l......?D....N...k.n..m"c...i......._....R.%..y...#N./ $../..p.E....v!#...._..r....K....../0.|.....p.L.........H...._...#/v..._P.C2.b.`....y!.K...x!...@p.2.".oh...`......X.B.C;P_.L/H....@...N..8?.0O.C;.`(...q.\. ..O.$ar .@%I.!v...}...I&.n.......H...H...H..t..."...9.....?..%.....D................................}....ume....]U....ME=....5-%...................&..E.t$..T$.<{....%.....H.|$...~.9.g...Sd2.OH.. ......kn(...$. 1.H9..+..t>d....4..u......~2..w..H.. mU.H.=d...o...V..`...V..=[._w.Ru6..O
                                                Process:/usr/bin/crontab
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):217
                                                Entropy (8bit):5.192025457344543
                                                Encrypted:false
                                                SSDEEP:6:SUrpqoqQjEOP1KYGQ6OBFQLvwNGuiGMQ5UYLtCFt3HYDNdy:8QjrB80jUeHLUHYDNdy
                                                MD5:D2BAA5308A46348B60B829098570BF0A
                                                SHA1:0E4E23C523A1CCFED41E8BB51425B4DEC227FBDE
                                                SHA-256:022F4325B77EED7CAD923E23E2FEE77F1F0CB740104DDD345A5C13E75E2187C5
                                                SHA-512:0A49EB45F9A0F590ECC5F30FF616F5C76E2B0359880ADB92485EE6DA1398F6A137F162400E8071A06533275BCE845EE1384FBDE566CC79CE26571C6923D8A255
                                                Malicious:true
                                                Reputation:low
                                                Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (task.cron installed on Tue Apr 15 11:54:48 2025).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot /usr/sbin/uplugplay -cron.
                                                File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
                                                Entropy (8bit):7.9428123992727295
                                                TrID:
                                                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                File name:na.elf
                                                File size:435'932 bytes
                                                MD5:3c66d08596e581fc2481406e7ac98206
                                                SHA1:72c5a050386759ac4c869466a6b8b03327f1348e
                                                SHA256:f05d22b4c1b8e77e1122b13b677905d38b13f45c7c9541942143878544ca586a
                                                SHA512:4c275bf56d60edc362be18253aa5b3580fe4bba03a7dbc8091a1c804df35f9d5fe7c4ce2aa8f3eb5a4f90ff8dbec86ec460f70506834679971937c5b3e45ae4a
                                                SSDEEP:6144:63fxS1fHETSACF2Gzm5DVvSHrKKRH4SCra+HWMiFbcAOXmb4Dsi6wwcitgq:25WOSACZSV6eKRH5EPiamb4DsDwwc6
                                                TLSH:AF9423F8C83D2E30D8169B3CBB5A826CF0A15772D9562B6EB51AF5732179F1FAC60101
                                                File Content Preview:.ELF..............>.....`.].....@...................@.8...........................@.......@.............XH...............................PW......PW.....M.......M...............Q.td....................................................V..9UPX!............!v.

                                                ELF header

                                                Class:ELF64
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:Advanced Micro Devices X86-64
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x15de360
                                                Flags:0x0
                                                ELF Header Size:64
                                                Program Header Offset:64
                                                Program Header Size:56
                                                Number of Program Headers:3
                                                Section Header Offset:0
                                                Section Header Size:0
                                                Number of Section Headers:0
                                                Header String Table Index:0
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x4000000x4000000x10000x11748587.60540x6RW 0x1000
                                                LOAD0x00x15750000x15750000x69e4d0x69e4d7.94300x5R E0x1000
                                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 15, 2025 18:54:09.623672962 CEST43928443192.168.2.2391.189.91.42
                                                Apr 15, 2025 18:54:15.254657030 CEST42836443192.168.2.2391.189.91.43
                                                Apr 15, 2025 18:54:16.022551060 CEST4251680192.168.2.23109.202.202.202
                                                Apr 15, 2025 18:54:31.124562979 CEST43928443192.168.2.2391.189.91.42
                                                Apr 15, 2025 18:54:41.363135099 CEST42836443192.168.2.2391.189.91.43
                                                Apr 15, 2025 18:54:45.458547115 CEST4251680192.168.2.23109.202.202.202
                                                Apr 15, 2025 18:55:12.078798056 CEST43928443192.168.2.2391.189.91.42

                                                System Behavior