Analysis

  • max time network
    153s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-02-2024 07:56

General

  • Target

    c39188407f28e1d3e6cd8c5e9c75776d.elf

  • Size

    124KB

  • MD5

    c39188407f28e1d3e6cd8c5e9c75776d

  • SHA1

    a06917f6c1bda363a62fdae67ed1cd63c6b4e92b

  • SHA256

    8f811d8fa83f669a63e5869b3253fae97cc8f1aa291762435208631ae4dae11c

  • SHA512

    f342043c6c3a555ea432df8b68c4740c93f0ce1c019882f108a1c7bb265b6e40540653297708a91b48afecd0b9d4954fe0910e97299b5c9262cddd6ed5a307aa

  • SSDEEP

    1536:Qonr7/CxMBUVyaoetIMiCag4NGwESHIKT9LNl7mixdnU4cwD2qopSl1Dzw/9Hi6e:Ij7cO4NGwESHIYZdn1cwDjUkDM/9tSis

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

Processes

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads