Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-11-2024 23:47

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/botnet.m68k.elf: exec format error

General

  • Target

    botnet.m68k.elf

  • Size

    81KB

  • MD5

    012682b1d4ff2d42567075594e06df7c

  • SHA1

    4956ac93e8d43ea7270b85d9de1d8ba7f87e8dce

  • SHA256

    f5ad7281367281d25c35dd9c0c88897e25ce6a5fa9908362833ac3362316d93f

  • SHA512

    068188b0155faade091ca42f75480b53ee28f04cc2d84b2dbebaff805967b143f89e1fa49d7c01fdbfdee0eb1131a3e129e1bd46d82cbd535ddd084c7741e2b9

  • SSDEEP

    1536:0Iutzccc6jfekL19ubp7RQscx87W4pVTuxUYnjroV3eYeTBnH7:b6jfekLju97iscLyuaqpYeTBnH7

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/botnet.m68k.elf
    /tmp/botnet.m68k.elf
    1⤵
      PID:655

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads