IOC Report
gwX4DFn6ue.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/gwX4DFn6ue.elf
/tmp/gwX4DFn6ue.elf
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.fp4DJdWBoT /tmp/tmp.8HjWXLsyfB /tmp/tmp.nLnZo31oWc
/usr/bin/dash
-
/usr/bin/cat
cat /tmp/tmp.fp4DJdWBoT
/usr/bin/dash
-
/usr/bin/head
head -n 10
/usr/bin/dash
-
/usr/bin/tr
tr -d \\000-\\011\\013\\014\\016-\\037
/usr/bin/dash
-
/usr/bin/cut
cut -c -80
/usr/bin/dash
-
/usr/bin/cat
cat /tmp/tmp.fp4DJdWBoT
/usr/bin/dash
-
/usr/bin/head
head -n 10
/usr/bin/dash
-
/usr/bin/tr
tr -d \\000-\\011\\013\\014\\016-\\037
/usr/bin/dash
-
/usr/bin/cut
cut -c -80
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.fp4DJdWBoT /tmp/tmp.8HjWXLsyfB /tmp/tmp.nLnZo31oWc
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://motd.ubuntu.com/
54.171.230.55

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.25

IPs

IP
Domain
Country
Malicious
54.171.230.55
unknown
United States
54.247.62.1
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
560f8f805000
page read and write
7ffcdc13d000
page read and write
560f9181a000
page read and write
7f10a6ee1000
page read and write
7f10a70c2000
page read and write
7f0fa0027000
page execute read
7f10a6905000
page read and write
7f10a6b93000
page read and write
7f10a65a3000
page read and write
560f8f7fc000
page read and write
560f91f42000
page read and write
560f91803000
page execute and read and write
7f10a6cff000
page read and write
7f10a0021000
page read and write
7f10a720f000
page read and write
7f10a6511000
page read and write
7f10a6b70000
page read and write
7ffcdc1b6000
page execute read
7f0fa005a000
page read and write
7f10a7254000
page read and write
7f109f7fe000
page read and write
7f10a5d09000
page read and write
560f8f5ab000
page execute read
7f109ffff000
page read and write
7f10a71eb000
page read and write
There are 15 hidden memdumps, click here to show them.