IOC Report
LJTtnwewUQ.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/LJTtnwewUQ.elf
/tmp/LJTtnwewUQ.elf
/tmp/LJTtnwewUQ.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed
There are 2 hidden processes, click here to show them.

Domains

Name
IP
Malicious
kovey.mezo-api.xyz
45.131.111.219
malicious

IPs

IP
Domain
Country
Malicious
45.131.111.219
kovey.mezo-api.xyz
Germany
malicious
109.202.202.202
unknown
Switzerland
89.190.156.145
unknown
United Kingdom
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
414000
page execute read
malicious
7ffc9e6d7000
page read and write
517000
page read and write
7ffc9e710000
page execute read
515000
page read and write
d7b000
page read and write