IOC Report
Aqua.arm7.elf

loading gif

Files

File Path
Type
Category
Malicious
Aqua.arm7.elf
ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, with debug_info, not stripped
initial sample
malicious
/tmp/qemu-open.f7nSNS (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/Aqua.arm7.elf
/tmp/Aqua.arm7.elf
/tmp/Aqua.arm7.elf
-

Domains

Name
IP
Malicious
45.148.10.84
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7f801c021000
page read and write
7f8023d39000
page read and write
55865b5bd000
page read and write
55865879d000
page execute read
7f80240ac000
page read and write
55865aa0c000
page read and write
7f80233fb000
page read and write
7f80239eb000
page read and write
5586589ee000
page read and write
7ffef79ae000
page read and write
7f8023f1a000
page read and write
7f8022b61000
page read and write
7f801bfff000
page read and write
7f802375d000
page read and write
7ffef79ff000
page execute read
7f8023369000
page read and write
7f8024067000
page read and write
7f8024043000
page read and write
5586589f7000
page read and write
7f7f1c02b000
page execute read
7f8023b57000
page read and write
7f7f1c033000
page read and write
55865a9f5000
page execute and read and write
7f7f1c038000
page read and write
7f80239c8000
page read and write
There are 15 hidden memdumps, click here to show them.