IOC Report
SecuriteInfo.com.Linux.Siggen.9999.19167.28364.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/SecuriteInfo.com.Linux.Siggen.9999.19167.28364.elf
/tmp/SecuriteInfo.com.Linux.Siggen.9999.19167.28364.elf
/tmp/SecuriteInfo.com.Linux.Siggen.9999.19167.28364.elf
-
/tmp/SecuriteInfo.com.Linux.Siggen.9999.19167.28364.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed
/usr/sbin/gdm3
-
/etc/gdm3/PrimeOff/Default
/etc/gdm3/PrimeOff/Default
/usr/sbin/gdm3
-
/etc/gdm3/PrimeOff/Default
/etc/gdm3/PrimeOff/Default
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-user-runtime-dir
/lib/systemd/systemd-user-runtime-dir stop 127
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
malicious

IPs

IP
Domain
Country
Malicious
93.123.85.221
unknown
Bulgaria

Memdumps

Base Address
Regiontype
Protect
Malicious
8059000
page execute read
malicious
ffb10000
page read and write
c02000
page execute read
827a000
page read and write
805c000
page read and write
f7fb1000
page execute read