IOC Report
SYoMGYCkDG.elf

loading gif

Files

File Path
Type
Category
Malicious
SYoMGYCkDG.elf
ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, not stripped
initial sample
malicious
/tmp/qemu-open.Y54pMM (deleted)
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/SYoMGYCkDG.elf
/tmp/SYoMGYCkDG.elf
/tmp/SYoMGYCkDG.elf
-
/tmp/SYoMGYCkDG.elf
-
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.SRW62QzKFs /tmp/tmp.PYYO00TAbo /tmp/tmp.kVqVH3y4Dp
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.SRW62QzKFs /tmp/tmp.PYYO00TAbo /tmp/tmp.kVqVH3y4Dp

URLs

Name
IP
Malicious
162.215.219.170:4444
malicious
http://www.baidu.com/search/spider.html)
unknown
http://www.billybobbot.com/crawler/)
unknown
http://fast.no/support/crawler.asp)
unknown
http://feedback.redkolibri.com/
unknown
http://www.baidu.com/search/spider.htm)
unknown

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.25

IPs

IP
Domain
Country
Malicious
162.215.219.170
unknown
United States
malicious
54.217.10.153
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
7fb258022000
page execute read
malicious
7fb258022000
page execute read
malicious
563965163000
page read and write
7fb350bda000
page read and write
7fb258032000
page execute and read and write
7fb25803a000
page read and write
7fb34fa08000
page read and write
563961bff000
page read and write
7fb3504a8000
page read and write
7fb35020b000
page read and write
563961974000
page execute read
7ffd5558b000
page execute read
563961bf7000
page read and write
563963c13000
page read and write
7fb258039000
page execute and read and write
7fb35086a000
page read and write
7fb350219000
page read and write
7fb25803a000
page read and write
7fb350bda000
page read and write
7ffd55515000
page read and write
7fb35088f000
page read and write
7fb35086a000
page read and write
7fb3504a8000
page read and write
563961974000
page execute read
7fb350d0b000
page read and write
563961bff000
page read and write
7ffd55515000
page read and write
563963bfd000
page execute and read and write
7ffd5558b000
page execute read
7fb350d03000
page read and write
7fb258039000
page execute and read and write
7fb348021000
page read and write
563965163000
page read and write
563963bfd000
page execute and read and write
7fb350d50000
page read and write
7fb350d50000
page read and write
7fb35020b000
page read and write
7fb348021000
page read and write
7fb350d0b000
page read and write
7fb348000000
page read and write
563961bf7000
page read and write
7fb350219000
page read and write
7fb350d03000
page read and write
7fb348000000
page read and write
563963c13000
page read and write
7fb258032000
page execute and read and write
7fb35088f000
page read and write
7fb34fa08000
page read and write
There are 38 hidden memdumps, click here to show them.