Behavioral task
behavioral1
Sample
74a07162be0c1ae9c08e919f94521263ecff5696935b6f8ab6bad1b17e1876bf.elf
Resource
debian9-mipsbe-20240611-en
debian-9-mips
0 signatures
150 seconds
General
-
Target
c9b5936c02aadf9f3217d50e5ea5aaef.bin
-
Size
15KB
-
MD5
6a134e71f47c73c67fc4488adf4f663e
-
SHA1
d574aa87ca5f8071efb827b446e024ea62f6026c
-
SHA256
07c0e594aba0a3cfd2619c81d6f866ef160a6b401dc20f5db5bafde6e0fd60e4
-
SHA512
1a852b4629431ca92c4680418e79729ab5197702a01832417c7389744face03a54da8e499eb7a3d245d5303c71f8770d2f5f17a97c881327849f2e304f71584e
-
SSDEEP
384:R8XVjf4uaD6uZM7PhGIfxNGD0c5b80wqUJ136OhdvqmBa:Axf4uaDKpGIfxN+0c5b80wN6Opa
Score
10/10
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule static1/unpack001/74a07162be0c1ae9c08e919f94521263ecff5696935b6f8ab6bad1b17e1876bf.elf family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule static1/unpack001/74a07162be0c1ae9c08e919f94521263ecff5696935b6f8ab6bad1b17e1876bf.elf family_kaiten -
Kaiten family
Files
-
c9b5936c02aadf9f3217d50e5ea5aaef.bin.zip
Password: infected
-
74a07162be0c1ae9c08e919f94521263ecff5696935b6f8ab6bad1b17e1876bf.elf.elf linux mipsbe