Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
912a709819892a175b2bed25888d0e8f4d665a78eaba17d5466da17361a2dad0.elf
Resource
debian9-armhf-20221111-en
0 signatures
150 seconds
General
-
Target
c187268b466a3059073a1494712b1e72.bin
-
Size
102KB
-
MD5
b156444004ecb55aa2b1b0ad407461dc
-
SHA1
64ade9476250922e9eda41eee3dc3271d251013a
-
SHA256
3bcbe2e18500a9032ff45e33991b6aee3b7223ed5a6ebedd0dde9ac74929643e
-
SHA512
2ebfa28c5b0d55d2ce510f5f135b0874e8ce8cfd0fe389eb778efd597d565f0a89a1f52efc38614419e16d42428c791a9c70bba258ce5159c189f39fd8e9a43d
-
SSDEEP
3072:zI+Glpj4PRYWqA5XMIZ0mkVc9CZGXkFkxe9xfIuOnZ:zBGP8T8IuSCPpxfD6Z
Score
8/10
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule static1/unpack001/912a709819892a175b2bed25888d0e8f4d665a78eaba17d5466da17361a2dad0.elf patched_upx
Files
-
c187268b466a3059073a1494712b1e72.bin.zip
Password: infected
-
912a709819892a175b2bed25888d0e8f4d665a78eaba17d5466da17361a2dad0.elf.elf linux arm