Behavioral task
behavioral1
Sample
a65f1664ac6666e1e1b324464d5a3a125c89764940a022d056b9a2d65ad5ed0e.elf
Resource
ubuntu2404-amd64-20240729-en
kaijidefense_evasiondiscoveryexecutionpersistenceprivilege_escalatioprivilege_escalationransomwarerootkit
8 signatures
150 seconds
General
-
Target
a65f1664ac6666e1e1b324464d5a3a125c89764940a022d056b9a2d65ad5ed0e.elf
-
Size
1.8MB
-
MD5
3b0cc5dd65238abdc55e9c47d0d8660f
-
SHA1
81d42740e04d5378d96c1a8ebd7de21863225dc4
-
SHA256
a65f1664ac6666e1e1b324464d5a3a125c89764940a022d056b9a2d65ad5ed0e
-
SHA512
dbd19679e394a0ca56742f6b29fb8fc15adb0bfa6f714250b788a9b53199a1a74c9c39a94ea13fc5b06b846cc93c86f56ccdf34ffd1ad8cd09e826cf513f99df
-
SSDEEP
24576:ae9ufJvk4gQjMNRfktnsIXvZFyD9i+MPCIxyuzNqssZXJj4bdYVVMtIwWz1v:WYMnwRO4ssPcd5Wz1
Score
10/10
Malware Config
Extracted
Family
kaiji
C2
ss.us-tv.top:1930
Signatures
-
Kaiji 1 IoCs
Kaiji payload
Processes:
resource yara_rule sample Kaiji -
Kaiji family
Files
-
a65f1664ac6666e1e1b324464d5a3a125c89764940a022d056b9a2d65ad5ed0e.elf.elf linux x86