IOC Report
dvwkja7.elf

loading gif

Files

File Path
Type
Category
Malicious
dvwkja7.elf
ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, with debug_info, not stripped
initial sample
malicious
/tmp/qemu-open.7GJa3r (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/dvwkja7.elf
/tmp/dvwkja7.elf
/tmp/dvwkja7.elf
-
/tmp/dvwkja7.elf
-

Domains

Name
IP
Malicious
raw.eye-network.ru
213.232.235.18
malicious
raw.eye-network.ru. [malformed]
unknown
malicious

IPs

IP
Domain
Country
Malicious
213.232.235.18
raw.eye-network.ru
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7fc750033000
page execute read
malicious
7ffe6dd69000
page execute read
5629f3074000
page read and write
7fc856cd2000
page read and write
7ffe6dca9000
page read and write
5629f0a8b000
page read and write
7fc856e1f000
page read and write
5629f2a92000
page execute and read and write
7fc856dfb000
page read and write
5629f083a000
page execute read
7fc856121000
page read and write
7fc85690f000
page read and write
7fc850021000
page read and write
7fc856af1000
page read and write
7fc84ffff000
page read and write
7fc855919000
page read and write
5629f2aa9000
page read and write
7fc75003c000
page read and write
7fc856515000
page read and write
7fc8561b3000
page read and write
7fc750043000
page read and write
7fc856780000
page read and write
7fc8567a3000
page read and write
5629f0a94000
page read and write
7fc856e64000
page read and write
There are 15 hidden memdumps, click here to show them.