IOC Report
Tb0uDdOwyO.elf

loading gif

Files

File Path
Type
Category
Malicious
Tb0uDdOwyO.elf
ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.BMIFQP (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/Tb0uDdOwyO.elf
/tmp/Tb0uDdOwyO.elf
/tmp/Tb0uDdOwyO.elf
-
/tmp/Tb0uDdOwyO.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed

Domains

Name
IP
Malicious
cnc.voidnet.click
94.156.79.77

IPs

IP
Domain
Country
Malicious
94.156.79.77
cnc.voidnet.click
Bulgaria
89.190.156.145
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
55c7e9c3d000
page read and write
7f1cbc418000
page execute read
7f1d41728000
page read and write
55c7ed746000
page read and write
55c7e99b5000
page execute read
7ffe45dda000
page execute read
7f1d4023e000
page read and write
55c7ebc45000
page execute and read and write
7f1d41720000
page read and write
55c7ebc5c000
page read and write
7ffe45dc1000
page read and write
7f1d3c021000
page read and write
55c7e9c47000
page read and write
7f1cbc45c000
page read and write
7f1cbc459000
page read and write
7f1d3c000000
page read and write
7f1d415f7000
page read and write
7f1d40a46000
page read and write
7f1d410a5000
page read and write
7f1d4176d000
page read and write
7f1d410e5000
page read and write
7f1d40a54000
page read and write
7f1d40d04000
page read and write
7f1d410c8000
page read and write
7f1d41416000
page read and write
There are 15 hidden memdumps, click here to show them.