Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    10-11-2024 18:18

General

  • Target

    yakuza.mips.elf

  • Size

    134KB

  • MD5

    9f3f7bd5e32a53708f952a9ea318785a

  • SHA1

    8109a92d23de2137f45d5fc2f16decfa4e29411a

  • SHA256

    0ab40031397e850525f7e5f49b4eb038dc886092c0f7f9f15862f1d9bb52657d

  • SHA512

    a7f33a76d2b9cbfad8cd993d55b69f832c2edab4d93c9d566dab064661d58c904eb442e224cb21ab50deb2a0675c00fa2285337ea1f6668b5b666c902831e306

  • SSDEEP

    3072:fflT32yc4c7nx1qs8RvduSXekkBXCqd2ES2vuYlPrKnJ1u5hW8xxxx8cr/tzYiFy:lKzK/u5hW8xxxx8crSiF3xemqY1fuBme

Score
4/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/yakuza.mips.elf
    /tmp/yakuza.mips.elf
    1⤵
    • Changes its process name
    • System Network Configuration Discovery
    PID:706

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads