Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-12-2024 12:42

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/jew.m68k.elf: exec format error

General

  • Target

    jew.m68k.elf

  • Size

    78KB

  • MD5

    3ce9505f3de32204074229247714c439

  • SHA1

    a9d2f5424c514560fd31681b7d6661f8b23d6771

  • SHA256

    c23ed0fe9d14eafff30fa966639e30d97f5a5b45f618e65cc00068a947f16f5c

  • SHA512

    228e9126c518d8116d6763c2aa35b7c9c000ed8e6eb5abcb5eb12672e72410128ed7ecbad2e72c7b205aba6246be757bff93e96297efc19d5bbf6a6d9156161f

  • SSDEEP

    1536:LD0c8vMjxzgC3dikincJ8Xn+vQeuacWjcW0JcWcBzwA9LJEZZlqUxACh:LP8vCxzgC3amvQeuacWjcW0JcWcB0lZr

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/jew.m68k.elf
    /tmp/jew.m68k.elf
    1⤵
      PID:656

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads