IOC Report
2QufQlF1Rv.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/2QufQlF1Rv.elf
/tmp/2QufQlF1Rv.elf

Domains

Name
IP
Malicious
daisy.ubuntu.com
162.213.35.24

Memdumps

Base Address
Regiontype
Protect
Malicious
7f5e7c021000
page read and write
7f5e816a6000
page read and write
7f5e81e63000
page read and write
7f5e7bfff000
page read and write
558c2e0ac000
page read and write
558c2c097000
page read and write
558c2c08e000
page read and write
7f5e81911000
page read and write
7f5d7c02b000
page execute read
558c2e095000
page execute and read and write
7f5e81c82000
page read and write
7ffef6870000
page execute read
7f5e81f8c000
page read and write
558c2be3d000
page execute read
7f5e81344000
page read and write
7f5d7c034000
page read and write
7f5e81fb0000
page read and write
7f5e81aa0000
page read and write
7ffef683c000
page read and write
7f5d7c03e000
page read and write
7f5e81ff5000
page read and write
7f5e81934000
page read and write
558c2e8b9000
page read and write
7f5e812b2000
page read and write
7f5e80aaa000
page read and write
There are 15 hidden memdumps, click here to show them.