Behavioral task
behavioral1
Sample
ff054af7c9b48eca3c2a3a2952a4501609d89d00ce7fcd2162d943b8872f71b7.elf
Resource
debian12-armhf-20240221-en
0 signatures
150 seconds
General
-
Target
b920246566d1b782e9896772319c435c.bin
-
Size
4KB
-
MD5
d735e23c99e1775f49122c842b5d1c94
-
SHA1
9a44a02ef934d0df8d6eb3da2dc051b704b0be36
-
SHA256
acca77e77913cd26abcea3c99c575c1739477e22370936be968a1daac80739d8
-
SHA512
26ad048fe7456e8bb7a8403edecc86fa805207ddd2ca2c9d6cf690f3a99978026b226aed31e434cc59bd11126d1b27b87d522a053cc4db0a87a9cbd75d0c7d66
-
SSDEEP
96:yULqlZaRe4NV0ge7nN9BjOqpons33N2Ucfr2iIRrRh4t350pj6IFc+Yf4UA:8ce4NV0gqnN97pow3Nmfr2iIRMX0pnYI
Score
8/10
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule static1/unpack001/ff054af7c9b48eca3c2a3a2952a4501609d89d00ce7fcd2162d943b8872f71b7.elf patched_upx -
resource yara_rule static1/unpack001/ff054af7c9b48eca3c2a3a2952a4501609d89d00ce7fcd2162d943b8872f71b7.elf upx
Files
-
b920246566d1b782e9896772319c435c.bin.zip
Password: infected
-
ff054af7c9b48eca3c2a3a2952a4501609d89d00ce7fcd2162d943b8872f71b7.elf.elf linux arm