IOC Report
ppc.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/ppc.elf
/tmp/ppc.elf
/tmp/ppc.elf
-
/usr/lib/systemd/systemd
-
/usr/lib/snapd/snap-failure
/usr/lib/snapd/snap-failure snapd
/usr/lib/snapd/snap-failure
-
/usr/bin/systemctl
systemctl stop snapd.socket
/usr/lib/snapd/snap-failure
-

URLs

Name
IP
Malicious
https://root_senpai.selly.store/
unknown
https://bugs.launchpad.net/ubuntu/
unknown

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.24

IPs

IP
Domain
Country
Malicious
209.200.246.150
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7f374c0d0000
page execute read
malicious
56051f031000
page read and write
7f38413e0000
page read and write
7f3840ff9000
page read and write
7ffee9fe2000
page execute read
7f3841854000
page read and write
7f374c129000
page read and write
56051d7e9000
page read and write
7f383c000000
page read and write
7f3840d5c000
page read and write
7f374c0f3000
page read and write
7f3840d6a000
page read and write
7ffee9f90000
page read and write
56051b7d5000
page read and write
7f38418a1000
page read and write
56051b54a000
page execute read
56051b7cd000
page read and write
56051d7d3000
page execute and read and write
7f384172b000
page read and write
7f38413bb000
page read and write
7f3840559000
page read and write
7f383c021000
page read and write
7f384185c000
page read and write
There are 13 hidden memdumps, click here to show them.