Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    05-07-2024 06:06

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/Okami.sh4.elf: exec format error

General

  • Target

    Okami.sh4.elf

  • Size

    83KB

  • MD5

    01b7d9d2ba31331844b0412c686c23fd

  • SHA1

    0d17e9987b91aee0746d6fc0c8c9a99de58b0a90

  • SHA256

    1cfe5f0955635876e67526d35e92f6d1ac467144fe535a8cc4e87c6586800576

  • SHA512

    23044a48da27dfb4062ea6da516b69b5859810b947a3deac1eece2cf70c8faeb84e35813f87d82e506065d4cd92f28b100d7970f937f10c7e56014cc4c5be8d4

  • SSDEEP

    1536:QWkDaiqMKJmuRO+4FCqMgTSAC55hrI6eKnUsLzk0y/fKsjy1n:1QGTJF4FvZ05hrI6ksLzk0y/ysjy1n

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/Okami.sh4.elf
    /tmp/Okami.sh4.elf
    1⤵
      PID:646

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads