IOC Report
aNeRrtorRm.elf

loading gif

Files

File Path
Type
Category
Malicious
aNeRrtorRm.elf
ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.wR9ZYW (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/aNeRrtorRm.elf
/tmp/aNeRrtorRm.elf
/tmp/aNeRrtorRm.elf
-
/tmp/aNeRrtorRm.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed

Domains

Name
IP
Malicious
kovey.mezo-api.xyz
45.131.111.219
malicious

IPs

IP
Domain
Country
Malicious
45.131.111.219
kovey.mezo-api.xyz
Germany
malicious
89.190.156.145
unknown
United Kingdom
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7f60b841a000
page execute read
malicious
55d20d193000
page read and write
55d20cf0b000
page execute read
7f6138021000
page read and write
7f613e0d4000
page read and write
7f613e087000
page read and write
7f613d3ad000
page read and write
7ffff41d3000
page execute read
55d20d19d000
page read and write
7f60b845e000
page read and write
7f613da0c000
page read and write
7f6138000000
page read and write
55d20f1b2000
page read and write
7f613e08f000
page read and write
7f613cba5000
page read and write
7f613dd7d000
page read and write
7f613da4c000
page read and write
7f613d3bb000
page read and write
55d20f19b000
page execute and read and write
55d21036d000
page read and write
7f60b845b000
page read and write
7ffff41c9000
page read and write
7f613da2f000
page read and write
7f613d66b000
page read and write
7f613df5e000
page read and write
There are 15 hidden memdumps, click here to show them.