IOC Report
x86_64.elf

loading gif

Files

File Path
Type
Category
Malicious
x86_64.elf
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
initial sample
malicious
/tmp/Infected.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
/tmp/x86_64.elf
/tmp/x86_64.elf
/tmp/x86_64.elf
-
/tmp/x86_64.elf
-
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.ZMQNgdqH3f /tmp/tmp.Jx9fmM9bRk /tmp/tmp.zMTF95Nm9D
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.ZMQNgdqH3f /tmp/tmp.Jx9fmM9bRk /tmp/tmp.zMTF95Nm9D

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
malicious
https://developers.google.com/search/docs/advanced/crawling/overview-google-crawlers)
unknown
http://www.spidersoft.com)
unknown
http://help.yahoo.com/help/us/ysearch/slurp)
unknown
http://www.google.com/bot.html)
unknown
http://www.google.com/mobile/adsbot.html)
unknown

IPs

IP
Domain
Country
Malicious
181.214.231.152
unknown
Chile
34.249.145.219
unknown
United States
109.202.202.202
unknown
Switzerland
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
44a000
page execute read
malicious
44a000
page execute read
malicious
1424000
page read and write
7ffc76180000
page read and write
7ffc76180000
page read and write
556000
page read and write
101000
page execute read
101000
page execute read
300000
page execute and read and write
300000
page execute and read and write
1424000
page read and write
7ffc76184000
page execute read
556000
page read and write
7ffc76184000
page execute read
There are 4 hidden memdumps, click here to show them.