Static task
static1
Behavioral task
behavioral1
Sample
556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed
Resource
ubuntu-amd64
linux_amd64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed
Resource
debian9-mipsel
linux_mipsel
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed
Resource
debian9-mipsbe
linux_mips
0 signatures
0 seconds
General
-
Target
6442552750407680.zip
-
Size
36KB
-
MD5
2faffac6cf5f85885aebdfbd1e2ee381
-
SHA1
0cafe41ceaf0d113a9f29e06dc8c34a5879bde52
-
SHA256
04a5bf24f0aa1bf011b956d3fdaa71a3886ffbaf0959286eb3f86f3b4b616a93
-
SHA512
591a5862a26ef5754e32870f3c1e55964dac687919de6bb8c1f3458213d3b50915cb2933a6782bcd41f1a1afb4e2846e740ba8e6f41b82cc1ab7dfa619cc52e9
Score
10/10
Malware Config
Signatures
-
HelloKitty Elf 1 IoCs
resource yara_rule static1/unpack001/556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed family_hellokitty_elf -
Hellokitty family
Files
-
6442552750407680.zip.zip
Password: infected
-
556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed.elf linux x64