IOC Report
G7HgHiQE1U.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/G7HgHiQE1U.elf
/tmp/G7HgHiQE1U.elf

URLs

Name
IP
Malicious
http://103.174.73.190/tajma.mpsl;
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.25

Memdumps

Base Address
Regiontype
Protect
Malicious
7f5a88037000
page execute read
malicious
7f5b8f10e000
page read and write
7f5b902e6000
page read and write
5561bb46a000
page read and write
7ffee5c46000
page read and write
7f5b8f916000
page read and write
7f5b90614000
page read and write
7f5b90659000
page read and write
5561bd47f000
page read and write
7ffee5d96000
page execute read
7f5b87fff000
page read and write
7f5a88044000
page read and write
7f5b8f9a8000
page read and write
7f5b904c7000
page read and write
5561bd650000
page read and write
7f5a88050000
page read and write
7f5b8ff98000
page read and write
7f5b8ff75000
page read and write
5561bd468000
page execute and read and write
7f5b90104000
page read and write
5561bb210000
page execute read
7f5b88021000
page read and write
5561bb461000
page read and write
7f5b905f0000
page read and write
7f5b8fd0a000
page read and write
There are 15 hidden memdumps, click here to show them.