Behavioral task
behavioral1
Sample
556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed.elf
Resource
ubuntu1804-amd64-20231201-en
0 signatures
600 seconds
General
-
Target
556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed.zip
-
Size
35KB
-
MD5
a68efa107e96883caab676c2dde7838d
-
SHA1
211b3e69d50f7144059fb499b50cb6030512cefe
-
SHA256
66d2f56e6dd65a929acac531c78ea0af03880ff67bd608c4e0ab3f1214be57d8
-
SHA512
6cde879732efd44e9bbfed27636725c315a3483741d43d392b0696dbee6db6bb1a3e0a500f511447a2f5b5c4e80f6623d13108c93f501db2cb309abdd1f6328c
-
SSDEEP
768:v80IydcQ1J5TyPQjmGJ4XRVv8MxCnbtKtOVxzMwFodHbA0sL7WtyasEq:JIy+Qf5mQjeRVv8M8btmOVNYbAZ/BzEq
Score
10/10
Malware Config
Signatures
-
HelloKitty ELF 1 IoCs
resource yara_rule static1/unpack001/556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed.elf family_hellokitty_elf -
Hellokitty family
Files
-
556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed.zip.zip
Password: infected
-
556e5cb5e4e77678110961c8d9260a726a363e00bf8d278e5302cb4bfccc3eed.elf.elf linux x64