General

  • Target

    Mozi.mptwyhdcp

  • Size

    93KB

  • MD5

    9a111588a7db15b796421bd13a949cd4

  • SHA1

    034c8c51a58be11ca620ce3eb0d43d5a59275d2f

  • SHA256

    e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0

  • SHA512

    820053864dd506fcf7c126f4a8df72ee6113ec07baaa2f440739782eb06e2768ee3dba5ba0c8e89d9c0dd03dffc51027e455f73601f41c07e02b19eef69f4aa9

  • SSDEEP

    1536:pymLLU1F5kHIrIj0D6rhfd+lK3exiTCzxNtI4sZLi6UEbFEBFaW1EH6t6wfPP/Q:2F+ooxalK3exiTOijZLdUEbFlWPP/Q

Score
8/10

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

Files

  • Mozi.mptwyhdcp
    .elf linux arm