IOC Report
Okami.x86.elf

loading gif

Files

File Path
Type
Category
Malicious
Okami.x86.elf
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped
initial sample
malicious
/run/systemd/resolve/stub-resolv.conf
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.FwlO5wrX5a /tmp/tmp.NYwH2cEVku /tmp/tmp.AWvQJiT5Ib
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.FwlO5wrX5a /tmp/tmp.NYwH2cEVku /tmp/tmp.AWvQJiT5Ib
/tmp/Okami.x86.elf
/tmp/Okami.x86.elf
/tmp/Okami.x86.elf
-
/tmp/Okami.x86.elf
-
/tmp/Okami.x86.elf
-

URLs

Name
IP
Malicious
http://www.billybobbot.com/crawler/)
unknown
malicious
http://www.baidu.com/search/spider.html)
unknown
http://fast.no/support/crawler.asp)
unknown
http://feedback.redkolibri.com/
unknown
http://www.baidu.com/search/spider.htm)
unknown

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.25

IPs

IP
Domain
Country
Malicious
185.125.190.26
unknown
United Kingdom
93.123.85.246
unknown
Bulgaria

Memdumps

Base Address
Regiontype
Protect
Malicious
410000
page execute read
malicious
410000
page execute read
malicious
410000
page execute read
malicious
7fffa2acd000
page read and write
510000
page read and write
517000
page read and write
7fffa2b63000
page execute read
517000
page read and write
7fffa2b63000
page execute read
510000
page read and write
510000
page read and write
517000
page read and write
7fffa2acd000
page read and write
7fffa2b63000
page execute read
7fffa2acd000
page read and write
There are 5 hidden memdumps, click here to show them.