Analysis
-
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
28/05/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
6c4130ed85c11d42b6e6cb68a99509058bea559b5ecc5285f3b4a936e030d498.elf
Resource
debian9-armhf-20240418-en
General
-
Target
6c4130ed85c11d42b6e6cb68a99509058bea559b5ecc5285f3b4a936e030d498.elf
-
Size
97KB
-
MD5
fe13ae4360edb2d5fc7b20346b555918
-
SHA1
91e96ce375a84c1d8e0e98cbdcac45979e17cf85
-
SHA256
6c4130ed85c11d42b6e6cb68a99509058bea559b5ecc5285f3b4a936e030d498
-
SHA512
1d08192a0e3068f843f431d8e9b94e9497d47555e9b17b40f5d0a31e609d1782193deafb6d6469009424813d4a3b526cd92061c9e690d519640d52af8ffa8e1b
-
SSDEEP
1536:H2nmrfRDNRXNxMhX8xj2HNX1q1PuK+YBPl0OmjNk1TARUyYgGYv+B6C:P55tkhrqhryN8ylrC
Malware Config
Signatures
-
Contacts a large (76747) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 130.61.64.122