IOC Report
Aqua.mpsl.elf

loading gif

Files

File Path
Type
Category
Malicious
Aqua.mpsl.elf
ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.hmgx7t (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/Aqua.mpsl.elf
/tmp/Aqua.mpsl.elf
/tmp/Aqua.mpsl.elf
-

Domains

Name
IP
Malicious
45.148.10.84
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7f919c411000
page execute read
7f9220dbc000
page read and write
7f9221a96000
page read and write
7ffe6df55000
page execute read
7f922145b000
page read and write
7f921c021000
page read and write
5635bfc6c000
page execute read
7f922178c000
page read and write
7ffe6deeb000
page read and write
5635c1efc000
page execute and read and write
7f9221ae3000
page read and write
5635c3f82000
page read and write
5635c1f13000
page read and write
7f922196d000
page read and write
7f922143e000
page read and write
7f922141b000
page read and write
7f919c451000
page read and write
7f9221a9e000
page read and write
5635bfef4000
page read and write
7f919c454000
page read and write
7f92205b4000
page read and write
7f922107a000
page read and write
7f921c000000
page read and write
7f9220dca000
page read and write
5635bfefe000
page read and write
There are 15 hidden memdumps, click here to show them.