IOC Report
Okami.i586.elf

loading gif

Files

File Path
Type
Category
Malicious
Okami.i586.elf
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, not stripped
initial sample
malicious
/run/systemd/resolve/stub-resolv.conf
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/Okami.i586.elf
/tmp/Okami.i586.elf
/tmp/Okami.i586.elf
-
/tmp/Okami.i586.elf
-
/tmp/Okami.i586.elf
-

URLs

Name
IP
Malicious
http://www.billybobbot.com/crawler/)
unknown
malicious
http://www.baidu.com/search/spider.html)
unknown
http://fast.no/support/crawler.asp)
unknown
http://feedback.redkolibri.com/
unknown
http://www.baidu.com/search/spider.htm)
unknown

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.25

IPs

IP
Domain
Country
Malicious
93.123.85.246
unknown
Bulgaria

Memdumps

Base Address
Regiontype
Protect
Malicious
8056000
page execute read
malicious
8056000
page execute read
malicious
8056000
page execute read
malicious
8057000
page read and write
f7fb4000
page execute read
f7fb4000
page execute read
ffaf7000
page read and write
ffaf7000
page read and write
ffaf7000
page read and write
8057000
page read and write
805d000
page read and write
8057000
page read and write
805d000
page read and write
805d000
page read and write
f7fb4000
page execute read
There are 5 hidden memdumps, click here to show them.