IOC Report
e1x.spc.elf

loading gif

Files

File Path
Type
Category
Malicious
e1x.spc.elf
ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/.system_idle
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/e1x.spc.elf
/tmp/e1x.spc.elf
/tmp/e1x.spc.elf
-
/tmp/e1x.spc.elf
-

IPs

IP
Domain
Country
Malicious
194.87.35.204
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
7fe794025000
page execute read
malicious
555f11afc000
page execute read
7fe89bf3f000
page read and write
7fe794036000
page read and write
7fe89c9df000
page read and write
7fe79403a000
page read and write
7fe89d287000
page read and write
7fe894000000
page read and write
555f144b2000
page read and write
555f13d48000
page read and write
7fe89d23a000
page read and write
555f11d2a000
page read and write
555f13d31000
page execute and read and write
7fe894021000
page read and write
7ffd3138a000
page execute read
555f11d33000
page read and write
7fe89d242000
page read and write
7fe89c742000
page read and write
7fe89c750000
page read and write
7fe89cda1000
page read and write
7fe89cdc6000
page read and write
7fe89d111000
page read and write
7ffd312e0000
page read and write
There are 13 hidden memdumps, click here to show them.