IOC Report
boatnet.m68k.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/boatnet.m68k.elf
/tmp/boatnet.m68k.elf

URLs

Name
IP
Malicious
http://5.181.159.16/wget.sh;
unknown
http://5.181.159.16/idk/home.arm7;chmod
unknown
http://5.181.159.16/w.sh;
unknown
http://5.181.159.16/c.sh;
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://5.181.159.16/idk/home.mips
unknown
http://5.181.159.16/idk/home.mips;
unknown
http://5.181.159.16/idk/home.x86
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.25

Memdumps

Base Address
Regiontype
Protect
Malicious
7f3c9401a000
page execute read
malicious
7f3d1a36d000
page read and write
55a9066ad000
page execute read
7f3d19b12000
page read and write
7f3d19875000
page read and write
7f3d19072000
page read and write
55a90a92a000
page read and write
7f3c9401c000
page read and write
7f3d1a375000
page read and write
7f3d19883000
page read and write
55a90897c000
page read and write
7f3d14000000
page read and write
7ffc0cbc1000
page read and write
7f3d19ed4000
page read and write
7f3d14021000
page read and write
7f3d19ef9000
page read and write
55a9068e7000
page read and write
7f3d1a244000
page read and write
7ffc0cbec000
page execute read
7f3c9401d000
page read and write
55a9088e5000
page execute and read and write
55a9068df000
page read and write
7f3d1a3ba000
page read and write
There are 13 hidden memdumps, click here to show them.