Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    21/10/2024, 18:35

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/SecuriteInfo.com.Android.BankBot.GoldDigger.9.13166.5632.elf: exec format error

General

  • Target

    SecuriteInfo.com.Android.BankBot.GoldDigger.9.13166.5632.elf

  • Size

    37KB

  • MD5

    8738249da26ebef03c181e5cb70917da

  • SHA1

    c32a4f524081ce6f3d142dfaad382a9fed72f652

  • SHA256

    7830ba43ca104dab43c675fab471be6a819d94769ffcea6343d9e3174a8a8a87

  • SHA512

    2876889a8de728f75c972cc38f33cddab778882c311f353e36a8ec99b3fb35ae6811a135c62456bb910aa51834d274e193a2106aecb350c51d35038aede4517f

  • SSDEEP

    768:f8/VGZ96/1n5D+Yn5/DsAXJ1XSyt5x4p:f8s

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/SecuriteInfo.com.Android.BankBot.GoldDigger.9.13166.5632.elf
    /tmp/SecuriteInfo.com.Android.BankBot.GoldDigger.9.13166.5632.elf
    1⤵
      PID:645

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads