IOC Report
ppc.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/ppc.elf
/tmp/ppc.elf

Memdumps

Base Address
Regiontype
Protect
Malicious
7fa4b13e8000
page read and write
55ebb9de6000
page execute and read and write
7ffc7a9e3000
page execute read
7ffc7a999000
page read and write
55ebb9dfc000
page read and write
7fa4b185c000
page read and write
7fa3bc013000
page read and write
55ebbaa0d000
page read and write
7fa4b0d72000
page read and write
7fa4b1733000
page read and write
7fa4b1001000
page read and write
55ebb7b5d000
page execute read
55ebb7de8000
page read and write
7fa4b1864000
page read and write
7fa4b0561000
page read and write
7fa4b0d64000
page read and write
7fa3bc010000
page execute and read and write
7fa4b18a9000
page read and write
55ebb7de0000
page read and write
7fa4b13c3000
page read and write
7fa3bc00f000
page execute read
7fa3bc012000
page execute and read and write
7fa4ac021000
page read and write
7fa4ac000000
page read and write
There are 14 hidden memdumps, click here to show them.