IOC Report
e1x.sh4.elf

loading gif

Files

File Path
Type
Category
Malicious
e1x.sh4.elf
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/.system_idle
ASCII text
dropped

Processes

Path
Cmdline
Malicious
/tmp/e1x.sh4.elf
/tmp/e1x.sh4.elf
/tmp/e1x.sh4.elf
-
/tmp/e1x.sh4.elf
-

IPs

IP
Domain
Country
Malicious
204.35.87.194
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
7f20e0410000
page execute read
malicious
7f2168394000
page read and write
7ffd2edb8000
page read and write
7f2160021000
page read and write
55db8c54c000
page execute read
55db8e77f000
page read and write
7f2168ecb000
page read and write
7f2168623000
page read and write
55db8e99b000
page read and write
55db8c762000
page read and write
7f20e0421000
page read and write
7f2168e7e000
page read and write
7ffd2ede5000
page execute read
7f2168e86000
page read and write
7f20e0420000
page read and write
7f2168a0a000
page read and write
55db8e768000
page execute and read and write
7f2168386000
page read and write
7f2167b83000
page read and write
7f2160000000
page read and write
7f2168d55000
page read and write
55db8c76a000
page read and write
7f21689e5000
page read and write
There are 13 hidden memdumps, click here to show them.