IOC Report
Y04kc90KjB.elf

loading gif

Files

File Path
Type
Category
Malicious
Y04kc90KjB.elf
ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.zrLeXM (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/Y04kc90KjB.elf
/tmp/Y04kc90KjB.elf
/tmp/Y04kc90KjB.elf
-
/tmp/Y04kc90KjB.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed

Domains

Name
IP
Malicious
cnc.voidnet.click
94.156.79.77

IPs

IP
Domain
Country
Malicious
94.156.79.77
cnc.voidnet.click
Bulgaria
89.190.156.145
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7fcf52cc8000
page read and write
7fcf53038000
page read and write
7fcf52ced000
page read and write
7fcecc01b000
page read and write
7fcf4c021000
page read and write
7fcf531ae000
page read and write
55bebfef9000
page execute read
7fcf52677000
page read and write
7fcecc016000
page execute read
7ffec0482000
page read and write
7fcf51e66000
page read and write
55bec012b000
page read and write
7fcf53169000
page read and write
7fcf52906000
page read and write
55bec0133000
page read and write
7fcf52669000
page read and write
7fcf53161000
page read and write
55bec2433000
page read and write
7fcf4c000000
page read and write
7ffec04f5000
page execute read
7fcecc018000
page read and write
55bec21c8000
page read and write
55bec2131000
page execute and read and write
There are 13 hidden memdumps, click here to show them.