Resubmissions

05-11-2022 18:57

221105-xl9wlsbdhk 8

04-11-2022 20:28

221104-y9c28acfar 8

02-11-2022 00:00

221102-aaj5gsgad4 8

01-11-2022 19:56

221101-ynxvhaefb4 8

01-11-2022 19:10

221101-xvfn5aeda8 8

31-10-2022 21:32

221031-1dxg4adce4 8

15-10-2022 20:19

221015-y3wkzsgbbj 8

14-10-2022 18:39

221014-xat11seah5 8

14-10-2022 18:29

221014-w4wk9seagq 8

General

  • Target

    Mozi.sh

  • Size

    93KB

  • MD5

    9a111588a7db15b796421bd13a949cd4

  • SHA1

    034c8c51a58be11ca620ce3eb0d43d5a59275d2f

  • SHA256

    e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0

  • SHA512

    820053864dd506fcf7c126f4a8df72ee6113ec07baaa2f440739782eb06e2768ee3dba5ba0c8e89d9c0dd03dffc51027e455f73601f41c07e02b19eef69f4aa9

  • SSDEEP

    1536:pymLLU1F5kHIrIj0D6rhfd+lK3exiTCzxNtI4sZLi6UEbFEBFaW1EH6t6wfPP/Q:2F+ooxalK3exiTOijZLdUEbFlWPP/Q

Score
8/10

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

Files

  • Mozi.sh
    .elf linux arm