IOC Report
.i.elf

loading gif

Files

File Path
Type
Category
Malicious
.i.elf
ELF 32-bit LSB executable, ARM, EABI5 version 1 (GNU/Linux), statically linked, no section header
initial sample
malicious
/var/log/btmp
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/.i.elf
/tmp/.i.elf
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-
/usr/sbin/sshd
-
/usr/sbin/sshd
/usr/sbin/sshd -D -R
/usr/sbin/sshd
-

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.24

Memdumps

Base Address
Regiontype
Protect
Malicious
55687765a000
page read and write
7f359e7d9000
page read and write
7f359f663000
page read and write
7ffdf15d2000
page execute read
5568771b3000
page read and write
55687719c000
page execute and read and write
7f359f7cf000
page read and write
556874f44000
page execute read
7f359f073000
page read and write
7f359f640000
page read and write
7ffdf15a4000
page read and write
7f359fcdf000
page read and write
7f359f9b1000
page read and write
7f359f3d5000
page read and write
7f359fcbb000
page read and write
556875195000
page read and write
55687519e000
page read and write
7f359fd24000
page read and write
7f3597fff000
page read and write
7f3498033000
page execute read
7f3598021000
page read and write
7f359fb92000
page read and write
7f359efe1000
page read and write
There are 13 hidden memdumps, click here to show them.