IOC Report
BN34UR6QlT.elf

loading gif

Files

File Path
Type
Category
Malicious
BN34UR6QlT.elf
ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.rpL8fx (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/BN34UR6QlT.elf
/tmp/BN34UR6QlT.elf
/tmp/BN34UR6QlT.elf
-
/tmp/BN34UR6QlT.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed

Domains

Name
IP
Malicious
cnc.voidnet.click
94.156.79.77
malicious
cnc.voidnet.click.'f66a0PV!E(ju55_v'fNNPV!a0E@-
unknown
malicious
cnc.voidnet.click.'f66a0PV!E(9;5^"'fNNPV!a0E@-
unknown
malicious
cnc.voidnet.click.'f66a0PV!E(j5SSX'fNNPV!a0E@-
unknown
malicious
cnc.voidnet.click.'f<566a0PV!E(:15<'f6NNPV!a0E@-
unknown
malicious
cnc.voidnet.click.'fu66a0PV!E(:+5q'fvJJPV!a0E<
unknown
malicious

IPs

IP
Domain
Country
Malicious
94.156.79.77
cnc.voidnet.click
Bulgaria
malicious
89.190.156.145
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
55bc27076000
page read and write
7fff9edf3000
page execute read
7f14a44fa000
page read and write
7f14a4138000
page read and write
55bc2908b000
page read and write
7fff9edd9000
page read and write
55bc29074000
page execute and read and write
55bc2a188000
page read and write
7f14a3698000
page read and write
7f14a499b000
page read and write
7f14a451f000
page read and write
7f149c000000
page read and write
7f14a3e9b000
page read and write
7f14a49e0000
page read and write
7f14a3ea9000
page read and write
7f141c414000
page read and write
7f14a486a000
page read and write
7f149c021000
page read and write
7f14a4993000
page read and write
55bc26e58000
page execute read
7f141c410000
page execute read
55bc2706e000
page read and write
7f141c411000
page read and write
There are 13 hidden memdumps, click here to show them.