Behavioral task
behavioral1
Sample
97b94797929c62c76f201611b92ef4ae1a6cc54cd9f13a6f162e87f0418be45f.elf
Resource
debian12-armhf-20240221-en
0 signatures
150 seconds
General
-
Target
1ae046ed0bb1362052bb1e63b241d3b3.bin
-
Size
2KB
-
MD5
e57c8f8dea576a09f1b2d521df0676cc
-
SHA1
c426773b035e0e5effbd7ca6b4832dee7b2baba4
-
SHA256
623d4fbb1caf4a412e5601ea54b82f298161eb0e8568a9f56db36926b4f45197
-
SHA512
d2dbfa0a127a6d4097c5c44d71a95e4e49ac8143c41136d323df183e4926ee65b4f1aba28896d639ec0ca9f0c4b9d3c11d24be5fd569a497cce38a6721b61466
Score
8/10
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule static1/unpack001/97b94797929c62c76f201611b92ef4ae1a6cc54cd9f13a6f162e87f0418be45f.elf patched_upx -
resource yara_rule static1/unpack001/97b94797929c62c76f201611b92ef4ae1a6cc54cd9f13a6f162e87f0418be45f.elf upx
Files
-
1ae046ed0bb1362052bb1e63b241d3b3.bin.zip
Password: infected
-
97b94797929c62c76f201611b92ef4ae1a6cc54cd9f13a6f162e87f0418be45f.elf.elf linux arm