IOC Report
WQiDRxwDWv.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/WQiDRxwDWv.elf
/tmp/WQiDRxwDWv.elf
/tmp/WQiDRxwDWv.elf
-
/tmp/WQiDRxwDWv.elf
-
/tmp/WQiDRxwDWv.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
/usr/libexec/gsd-housekeeping
/usr/libexec/gsd-housekeeping
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.ko4zXnsUUn /tmp/tmp.X0KvecmKYq /tmp/tmp.4oCEIDU4jq
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.ko4zXnsUUn /tmp/tmp.X0KvecmKYq /tmp/tmp.4oCEIDU4jq
There are 1 hidden processes, click here to show them.

IPs

IP
Domain
Country
Malicious
94.156.8.57
unknown
Bulgaria
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
805a000
page read and write
f7f77000
page execute read
805a000
page read and write
805c000
page read and write
f7f77000
page execute read
8059000
page execute read
ffce1000
page read and write
8cda000
page read and write
8059000
page execute read
ffce1000
page read and write
805c000
page read and write
8cda000
page read and write
There are 2 hidden memdumps, click here to show them.