IOC Report
arm4-20240504-1301.elf

loading gif

Processes

Path
Cmdline
Malicious
/tmp/arm4-20240504-1301.elf
/tmp/arm4-20240504-1301.elf
/tmp/arm4-20240504-1301.elf
-
/tmp/arm4-20240504-1301.elf
-
/tmp/arm4-20240504-1301.elf
-
/tmp/arm4-20240504-1301.elf
-
/tmp/arm4-20240504-1301.elf
-
/tmp/arm4-20240504-1301.elf
-
/tmp/arm4-20240504-1301.elf
-
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.BT85bFlL7I /tmp/tmp.rrJc4P7Djt /tmp/tmp.nS52FgaGwd
/usr/bin/dash
-
/usr/bin/rm
rm -f /tmp/tmp.BT85bFlL7I /tmp/tmp.rrJc4P7Djt /tmp/tmp.nS52FgaGwd
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7f67f0039000
page execute read
malicious
7f67f0039000
page execute read
malicious
7f67f0039000
page execute read
malicious
559cbcce0000
page read and write
559cbece7000
page execute and read and write
7f68f6b4b000
page read and write
7f68f6b4b000
page read and write
559cbece7000
page execute and read and write
559cbca8f000
page execute read
7f68f6f45000
page read and write
7ffe4b972000
page read and write
7f68f6757000
page read and write
7f68effff000
page read and write
559cbca8f000
page execute read
559cc05e4000
page read and write
7f68f6db6000
page read and write
7f68f5f4f000
page read and write
7f68f0021000
page read and write
7f68f6db6000
page read and write
7f68f6dd9000
page read and write
7f68f0021000
page read and write
7f68f7431000
page read and write
7f68f749a000
page read and write
7f68f6b4b000
page read and write
559cbcce9000
page read and write
7f68f7308000
page read and write
7f68f7431000
page read and write
7f68f6757000
page read and write
7f68f7127000
page read and write
7f67f01e0000
page read and write
7ffe4b97e000
page execute read
7f68f67e9000
page read and write
559cbca8f000
page execute read
7f68f67e9000
page read and write
7f67f0054000
page read and write
7f68f6f45000
page read and write
7f68f7308000
page read and write
559cbecfe000
page read and write
7f68f7127000
page read and write
7f68f0021000
page read and write
559cbece7000
page execute and read and write
559cbcce9000
page read and write
7f68f7308000
page read and write
7f68f7455000
page read and write
559cbecfe000
page read and write
7f68f6db6000
page read and write
559cbcce0000
page read and write
7ffe4b972000
page read and write
7f68f749a000
page read and write
559cbecfe000
page read and write
7f67f0054000
page read and write
7f68f6dd9000
page read and write
7ffe4b972000
page read and write
7f68f749a000
page read and write
7f67f0054000
page read and write
7ffe4b97e000
page execute read
559cbcce9000
page read and write
559cc05e4000
page read and write
7f68effff000
page read and write
7f68f6dd9000
page read and write
7f68f67e9000
page read and write
559cc05e4000
page read and write
7f68f5f4f000
page read and write
7f68f6f45000
page read and write
7f68f7127000
page read and write
7f68f5f4f000
page read and write
7f68f7431000
page read and write
7f68f6757000
page read and write
7f68f7455000
page read and write
559cbcce0000
page read and write
7ffe4b97e000
page execute read
7f68f7455000
page read and write
7f68effff000
page read and write
There are 63 hidden memdumps, click here to show them.