IOC Report
Aqua.ppc.elf

loading gif

Files

File Path
Type
Category
Malicious
Aqua.ppc.elf
ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.mZtje5 (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/Aqua.ppc.elf
/tmp/Aqua.ppc.elf
/tmp/Aqua.ppc.elf
-

Domains

Name
IP
Malicious
45.148.10.84
unknown

IPs

IP
Domain
Country
Malicious
185.125.190.26
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7ffbdff5f000
page read and write
7ffbdf0d8000
page read and write
7ffbdf8e9000
page read and write
7ffbd8000000
page read and write
7ffbdff3a000
page read and write
7ffd10bd5000
page execute read
7ffbe0420000
page read and write
7ffbdf8db000
page read and write
557801661000
page read and write
7ffbd8021000
page read and write
55780164b000
page execute and read and write
7ffbe03db000
page read and write
5577ff3c2000
page execute read
7ffbe03d3000
page read and write
7ffbe02aa000
page read and write
7ffd10b3f000
page read and write
557802900000
page read and write
5577ff645000
page read and write
7ffae8021000
page read and write
5577ff64d000
page read and write
7ffae800e000
page execute read
7ffae801e000
page read and write
7ffbdfb78000
page read and write
There are 13 hidden memdumps, click here to show them.