IOC Report
Aqua.spc.elf

loading gif

Files

File Path
Type
Category
Malicious
Aqua.spc.elf
ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.eESuG3 (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/Aqua.spc.elf
/tmp/Aqua.spc.elf
/tmp/Aqua.spc.elf
-

Domains

Name
IP
Malicious
45.148.10.84
unknown

IPs

IP
Domain
Country
Malicious
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7f65a7230000
page read and write
56447864b000
page read and write
7f65a6bac000
page read and write
5644767c1000
page execute and read and write
7ffd1fd54000
page execute read
7f65a0021000
page read and write
7f64a002f000
page read and write
7f64a0032000
page read and write
7f65a76a4000
page read and write
5644747ba000
page read and write
7f65a757b000
page read and write
7f65a720b000
page read and write
7ffd1fd2a000
page read and write
7f64a001f000
page execute read
7f65a0000000
page read and write
7f65a6bba000
page read and write
5644747c3000
page read and write
5644767d8000
page read and write
7f65a63a9000
page read and write
56447458c000
page execute read
7f65a76ac000
page read and write
7f65a6e49000
page read and write
7f65a76f1000
page read and write
There are 13 hidden memdumps, click here to show them.