IOC Report
dvwkja7.elf

loading gif

Files

File Path
Type
Category
Malicious
dvwkja7.elf
ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, with debug_info, not stripped
initial sample
malicious
/tmp/qemu-open.0T5UCc (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/dvwkja7.elf
/tmp/dvwkja7.elf
/tmp/dvwkja7.elf
-
/tmp/dvwkja7.elf
-

Domains

Name
IP
Malicious
raw.eye-network.ru
213.232.235.18
malicious
raw.eye-network.ru. [malformed]
unknown
malicious

IPs

IP
Domain
Country
Malicious
213.232.235.18
raw.eye-network.ru
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7fd984033000
page execute read
malicious
7fda8c721000
page read and write
55d16b6eb000
page execute read
7fda8cf0f000
page read and write
7fda8d464000
page read and write
7fda8d0f1000
page read and write
7ffcb1f7c000
page read and write
7fda8bf19000
page read and write
7fd98403c000
page read and write
7fda8cd80000
page read and write
7fda83fff000
page read and write
7fda8d2d2000
page read and write
55d16d95a000
page read and write
55d16b93c000
page read and write
7fd984043000
page read and write
55d16d943000
page execute and read and write
7ffcb1fba000
page execute read
7fda8d3fb000
page read and write
7fda8cb15000
page read and write
55d16b945000
page read and write
7fda84021000
page read and write
7fda8c7b3000
page read and write
7fda8d41f000
page read and write
55d16f301000
page read and write
7fda8cda3000
page read and write
There are 15 hidden memdumps, click here to show them.