Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c715a816785507ec31b29ab47ce14a1b0c0af3c6dc69a5046a959fa78973aa2f.elf
Resource
debian9-armhf-20221111-en
0 signatures
150 seconds
General
-
Target
c715a816785507ec31b29ab47ce14a1b0c0af3c6dc69a5046a959fa78973aa2f.zip
-
Size
30KB
-
MD5
428ca7be77947767f2fc5603fda8c6c9
-
SHA1
768a2bf9228475319bf5c55b6762b9a964e582b2
-
SHA256
e7cfaa43f816cd85e54764dea9b7210613e366019f422de6eaa1fde0be9e350e
-
SHA512
ac48f847afb3ad00c77a69a526115bf1df19409434db083e830826937a1626610aebf51cd12dc2d201f032e7a83fcd4681bdc860b288308200f05059e463273f
-
SSDEEP
768:PT0pkxkaU4tHTI73ukBOYdJMnE20r1q6LpmtfLSbIJ:PTYld4tzIiqeE2C17YtjS0J
Score
8/10
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule static1/unpack001/c715a816785507ec31b29ab47ce14a1b0c0af3c6dc69a5046a959fa78973aa2f.elf patched_upx
Files
-
c715a816785507ec31b29ab47ce14a1b0c0af3c6dc69a5046a959fa78973aa2f.zip.zip
Password: infected
-
c715a816785507ec31b29ab47ce14a1b0c0af3c6dc69a5046a959fa78973aa2f.elf.elf linux arm