Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    23-12-2024 17:09

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/jackmym86k.elf: exec format error

General

  • Target

    jackmym86k.elf

  • Size

    155KB

  • MD5

    a26f6fdf41bb8e4034409fb84adc83ba

  • SHA1

    8c03a273bdd2e8f54994d0d061fe259a2968ff41

  • SHA256

    7911664055520934019ddfa554219500fa5a038268c828a02b05aa6ad198fbbd

  • SHA512

    dcdf2befd602bee0a56c2a05e01171cb24aada733531e479b157ccb8a6d494c3c1fcaa261b813e4eedc498bdc3ba5664e6e3b4c42ce713cfe2d5a5dcc27cb897

  • SSDEEP

    3072:I2oimFUZQYA6lpqFTQeqacWucW0JcWcBRDpHf4JSYMtDh8DuvZJ3BxP6DhuSWmmE:6E8TQeqacWucW0JcWcBrHQ4vdh8DiZJQ

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/jackmym86k.elf
    /tmp/jackmym86k.elf
    1⤵
      PID:639

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads