Analysis

  • max time kernel
    0s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240729-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    13-11-2024 23:47

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/botnet.spc.elf: exec format error

General

  • Target

    botnet.spc.elf

  • Size

    81KB

  • MD5

    f4fe38c2b76277f1c2a5611f7b1e9f53

  • SHA1

    2a96017aab3df4c7a283199612fbe642af0cc325

  • SHA256

    2c6d300b601a41112b7c1e9003b4dec922b487adb75f7ebb3845d77ee01e0a2d

  • SHA512

    7f9c81672f90153152d3b2877d2ff3cb1692f5549b05e50909a68333a4532b50f43d3b44037989b7232e07ab93805eff39057b07635988d1b99779245d40c93d

  • SSDEEP

    1536:CCX1za6CuYbVh0wEgxw+mM9/n+LHKc8u0hkDLFJyW6kQ82TEVT5KAlSt8hwbZn2k:5PCuYbVh0wEgxw+30XSfAVNKAThwbZnr

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/botnet.spc.elf
    /tmp/botnet.spc.elf
    1⤵
      PID:713

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads