IOC Report
EOtMo9xTFK.elf

loading gif

Files

File Path
Type
Category
Malicious
EOtMo9xTFK.elf
ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.sQEKTP (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/EOtMo9xTFK.elf
/tmp/EOtMo9xTFK.elf
/tmp/EOtMo9xTFK.elf
-
/tmp/EOtMo9xTFK.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed

Domains

Name
IP
Malicious
kovey.mezo-api.xyz
45.131.111.219
malicious
kovey.mezo-api.xyz.b> f:66a0PV!E(R:[5Yb> fc<OOPV!a0EA
unknown
malicious
kovey.mezo-api.xyz.b> f66a0PV!E(e:H5PYb> fNNPV!a0E@
unknown
malicious
kovey.mezo-api.xyz.b> f66a0PV!E(95Yb> fOOPV!a0EA
unknown
malicious
kovey.mezo-api.xyz.b> f66a0PV!E(-:5hYb> fOOPV!a0EA
unknown
malicious
kovey.mezo-api.xyz.b> fp66a0PV!E(:5I%Yb> frOOPV!a0EA
unknown
malicious

IPs

IP
Domain
Country
Malicious
45.131.111.219
kovey.mezo-api.xyz
Germany
malicious
89.190.156.145
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7f1100018000
page execute read
malicious
7f1187545000
page read and write
55fa241a6000
page read and write
7f1186a0e000
page read and write
55fa21bda000
page read and write
7ffee87fc000
page read and write
7f1180000000
page read and write
7f1186c9d000
page read and write
7ffee8800000
page execute read
7f1187500000
page read and write
7f11873cf000
page read and write
7f11861fd000
page read and write
7f1187084000
page read and write
7f110001d000
page read and write
7f1180021000
page read and write
7f1186a00000
page read and write
7f110001a000
page read and write
7f11874f8000
page read and write
55fa23be0000
page execute and read and write
55fa21be2000
page read and write
55fa219a8000
page execute read
7f118705f000
page read and write
55fa23c77000
page read and write
There are 13 hidden memdumps, click here to show them.