IOC Report
RQG7u9IH4a.elf

loading gif

Files

File Path
Type
Category
Malicious
RQG7u9IH4a.elf
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, Go BuildID=dVWbo_pAVcVsrKUMrkUE/EqRjtXx7CGIFRuBWWLnb/tfTDuGvBVS2n_i2CYGkD/vWGbYUxMNx08ySmiDjaL, stripped
initial sample
malicious
/memfd: (deleted)
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
dropped
malicious

Processes

Path
Cmdline
Malicious
/tmp/RQG7u9IH4a.elf
/tmp/RQG7u9IH4a.elf
/tmp/RQG7u9IH4a.elf
-
/proc/self/fd/3
[kworker/8:AkZFaLl]

IPs

IP
Domain
Country
Malicious
45.124.64.27
unknown
Hong Kong
malicious
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
page execute and read and write
malicious
7fde16f9b000
page read and write
55f000
page read and write
4a0000
page execute read
7fde0289b000
page read and write
c000400000
page read and write
7fde1474b000
page read and write
7f93bfd4c000
page execute and read and write
7fde16b21000
page read and write
7fde1707a000
page read and write
7fddf271a000
page read and write
7ffdadd6a000
page execute read
593000
page read and write
7ffe91225000
page execute and read and write
7ffdadcb3000
page read and write
7ffe913ee000
page execute read
There are 6 hidden memdumps, click here to show them.