IOC Report
e35ErlXIYh.elf

loading gif

Processes

Path
Cmdline
Malicious
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.xYudcVSmGl /tmp/tmp.FkM0ejOBBU /tmp/tmp.kgkAE9cr4P
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.xYudcVSmGl /tmp/tmp.FkM0ejOBBU /tmp/tmp.kgkAE9cr4P
/tmp/e35ErlXIYh.elf
/tmp/e35ErlXIYh.elf

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.25

Memdumps

Base Address
Regiontype
Protect
Malicious
7f5d18037000
page execute read
malicious
562eb8091000
page read and write
7f5e1dbab000
page read and write
7f5e1d25c000
page read and write
7f5e1da19000
page read and write
562eb610b000
page execute and read and write
7f5e1c660000
page read and write
7fff229b0000
page execute read
562eb410d000
page read and write
7f5e1d4ea000
page read and write
7f5e1db66000
page read and write
7f5d18048000
page read and write
562eb3eb3000
page execute read
7f5e1db42000
page read and write
7f5e1d4c7000
page read and write
562eb6122000
page read and write
7f5e1d838000
page read and write
7f5e1ce68000
page read and write
7f5e18021000
page read and write
7f5e17fff000
page read and write
562eb4104000
page read and write
7f5d18043000
page read and write
7fff2297e000
page read and write
7f5e1d656000
page read and write
7f5e1cefa000
page read and write
There are 15 hidden memdumps, click here to show them.