IOC Report
na.elf

loading gif

Files

File Path
Type
Category
Malicious
na.elf
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
initial sample
malicious
/etc/CommId
ASCII text, with no line terminators
dropped
malicious
/usr/sbin/uplugplay
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
dropped
malicious
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/usr/lib/systemd/system/uplugplay.service
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/na.elf
/tmp/na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep na.elf"
/bin/sh
-
/usr/bin/pgrep
pgrep na.elf
/tmp/na.elf
-
/bin/sh
sh -c "pgrep uplugplay"
/bin/sh
-
/usr/bin/pgrep
pgrep uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pidof uplugplay"
/bin/sh
-
/usr/bin/pidof
pidof uplugplay
/tmp/na.elf
-
/bin/sh
sh -c "pgrep upnpsetup"
/bin/sh
-
/usr/bin/pgrep
pgrep upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "pidof upnpsetup"
/bin/sh
-
/usr/bin/pidof
pidof upnpsetup
/tmp/na.elf
-
/bin/sh
sh -c "systemctl daemon-reload"
/bin/sh
-
/usr/bin/systemctl
systemctl daemon-reload
/tmp/na.elf
-
/bin/sh
sh -c "systemctl enable uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl enable uplugplay.service
/tmp/na.elf
-
/bin/sh
sh -c "systemctl start uplugplay.service"
/bin/sh
-
/usr/bin/systemctl
systemctl start uplugplay.service
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/systemd
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay
/usr/sbin/uplugplay
-
/usr/sbin/uplugplay
-
/bin/sh
sh -c "/usr/sbin/uplugplay -Dcomsvc"
/bin/sh
-
/usr/sbin/uplugplay
/usr/sbin/uplugplay -Dcomsvc
/usr/sbin/uplugplay
-
/bin/sh
sh -c hostnamectl
/bin/sh
-
/usr/bin/hostnamectl
hostnamectl
/usr/sbin/uplugplay
-
/bin/sh
sh -c hostnamectl
/bin/sh
-
/usr/bin/hostnamectl
hostnamectl
/usr/sbin/uplugplay
-
/bin/sh
sh -c "dmidecode --type baseboard"
/bin/sh
-
/usr/sbin/dmidecode
dmidecode --type baseboard
/usr/sbin/uplugplay
-
/bin/sh
sh -c uptime
/bin/sh
-
/usr/bin/uptime
uptime
/usr/sbin/uplugplay
-
/bin/sh
sh -c "uname -a"
/bin/sh
-
/usr/bin/uname
uname -a
/usr/sbin/uplugplay
-
/bin/sh
sh -c "dmidecode --type baseboard"
/bin/sh
-
/usr/sbin/dmidecode
dmidecode --type baseboard
/usr/sbin/uplugplay
-
/bin/sh
sh -c "dmidecode --type baseboard"
/bin/sh
-
/usr/sbin/dmidecode
dmidecode --type baseboard
/usr/sbin/uplugplay
-
/bin/sh
sh -c "dmidecode --type baseboard"
/bin/sh
-
/usr/sbin/dmidecode
dmidecode --type baseboard
/usr/sbin/uplugplay
-
/bin/sh
sh -c "dmidecode --type baseboard"
/bin/sh
-
/usr/sbin/dmidecode
dmidecode --type baseboard
/usr/sbin/uplugplay
-
/bin/sh
sh -c "dmidecode --type baseboard"
/bin/sh
-
/usr/sbin/dmidecode
dmidecode --type baseboard
/usr/sbin/uplugplay
-
/bin/sh
sh -c dmidecode
/bin/sh
-
/usr/sbin/dmidecode
dmidecode
/usr/sbin/uplugplay
-
/bin/sh
sh -c uptime
/bin/sh
-
/usr/bin/uptime
uptime
/usr/sbin/uplugplay
-
/bin/sh
sh -c "uname -a"
/bin/sh
-
/usr/bin/uname
uname -a
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.0r9otCh3FR /tmp/tmp.vfLflbRNoi /tmp/tmp.kLbKiBNkqn
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.0r9otCh3FR /tmp/tmp.vfLflbRNoi /tmp/tmp.kLbKiBNkqn
There are 92 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://152.36.128.18/cgi-bin/p.cgi?r=21&i=Y3Q42OA0LE88Y83P
152.36.128.18
malicious
http://152.36.128.18/cgi-bin/p.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rgeexdcncj.oni
unknown
http://upx.sf.net
unknown
http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi
unknown
https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
unknown
http://xinchaobacffa.net/cgi-bin/p.cgi?r=0&auth=hash&i=Y3Q42OA0LE88Y83P&enckey=nXlwADqEx-2zdWd7dJcuF9GjlmyBIWszmJa0i/LgSULYESCtJB-4nMG1iyJ35QuRTW3RDSZjd-VPZbJGpx2MRpY3nTWEWeet38/uhG5bCCPFh/F1lEqVS1yi0T/ggtehud4RaxkXsSAaLqXsOWI1ZJzDL4SDwA5mkvjpqGQEZIw_
52.26.80.133
http://152.36.128.18/cgi-bin/p.cgi
unknown
http://dummy.zero/cgi-bin/prometei.cgi
unknown
http://152.36.128
unknown

Domains

Name
IP
Malicious
xinbacffa.org
unknown
malicious
xinchaobacffa.com
unknown
malicious
xinchaobacffa.net
52.26.80.133

IPs

IP
Domain
Country
Malicious
152.36.128.18
unknown
United States
malicious
54.171.230.55
unknown
United States
109.202.202.202
unknown
Switzerland
52.26.80.133
xinchaobacffa.net
United States
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
4f9000
page execute read
7f0225ffc000
page read and write
1575000
page read and write
7f0226ffe000
page read and write
7f022d4a4000
page read and write
7ffcbe9e8000
page execute read
7f02267fd000
page read and write
7f0228000000
page read and write
7f022dca5000
page read and write
7f02257fb000
page read and write
7f022cca3000
page read and write
7f02277ff000
page read and write
7f022e4a6000
page read and write
7ffcbe905000
page read and write
2b2a000
page read and write
7f0228021000
page read and write
There are 6 hidden memdumps, click here to show them.