Behavioral task
behavioral1
Sample
754f2022b72da704eb8636610c6d2ffcbdae9e8740555030a07c8c147387a537.elf
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
754f2022b72da704eb8636610c6d2ffcbdae9e8740555030a07c8c147387a537.zip
-
Size
17KB
-
MD5
bdcc263859ac07c9ee762ae59a946528
-
SHA1
3a90d2732fd02da281d946b6d92bd7c16f615d40
-
SHA256
3c1e138192f6bc3c032acec529a8efa976ea2f897408591fe28c369cbac53ae8
-
SHA512
f35e2880becb1d35c737595ea714ee6448a53dec4104cd9e41300e24bb1c3218c91b4c73863ee5b6d8c9f514a634ec4d456185532d41fecca5ca50a4335508c7
-
SSDEEP
384:NaXVrLP6YayjUpd64J384WL0I2agNA6W5xJ83eAn6ibrYARKcZSbJFuVVxn8APUQ:4XVHFayjG/QINEDe9n1EAHSbJ2X8As0V
Score
10/10
Malware Config
Signatures
-
HelloKitty ELF 1 IoCs
resource yara_rule static1/unpack001/754f2022b72da704eb8636610c6d2ffcbdae9e8740555030a07c8c147387a537.elf family_hellokitty_elf -
Hellokitty family
Files
-
754f2022b72da704eb8636610c6d2ffcbdae9e8740555030a07c8c147387a537.zip.zip
Password: infected
-
754f2022b72da704eb8636610c6d2ffcbdae9e8740555030a07c8c147387a537.elf.elf linux x64