IOC Report
Okami.i686.elf

loading gif

Files

File Path
Type
Category
Malicious
Okami.i686.elf
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, not stripped
initial sample
malicious
/run/systemd/resolve/stub-resolv.conf
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/Okami.i686.elf
/tmp/Okami.i686.elf
/tmp/Okami.i686.elf
-
/tmp/Okami.i686.elf
-
/tmp/Okami.i686.elf
-

URLs

Name
IP
Malicious
http://www.billybobbot.com/crawler/)
unknown
malicious
http://www.baidu.com/search/spider.html)
unknown
http://fast.no/support/crawler.asp)
unknown
http://feedback.redkolibri.com/
unknown
http://www.baidu.com/search/spider.htm)
unknown

IPs

IP
Domain
Country
Malicious
93.123.85.246
unknown
Bulgaria
malicious
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
8056000
page execute read
malicious
8056000
page execute read
malicious
8056000
page execute read
malicious
ff90e000
page read and write
ff90e000
page read and write
f7faf000
page execute read
f7faf000
page execute read
805d000
page read and write
8057000
page read and write
805d000
page read and write
805d000
page read and write
8057000
page read and write
ff90e000
page read and write
8057000
page read and write
f7faf000
page execute read
There are 5 hidden memdumps, click here to show them.