Analysis

  • max time kernel
    0s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240418-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    11-01-2025 22:47

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/yakuza.m68k.elf: exec format error

General

  • Target

    yakuza.m68k.elf

  • Size

    107KB

  • MD5

    01bf6bf482a93d82af4528374072a89e

  • SHA1

    6188e5db4b99e4eeaad6f2d0dcb98e643de4edb8

  • SHA256

    f4e96dfe16a8b08736ca81f39473925818b63b5f8ca1f884ea3608c77f5b03a5

  • SHA512

    e73b8a60bcec6ab71465bc634a60baf678991b7d3dcc2191079af52283ad6e7fd796db7f7bc1a066a36497005a6fcff9a1d5d6f99bef6387772aa3ceb30a1de5

  • SSDEEP

    3072:gWphsxTAkb3UT75bwHyAG5J3LIjs/mFZ09DuAoQfgm:gWpeAkbEv0yAQJ3LIjs/mFZ09DuAoQfB

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/yakuza.m68k.elf
    /tmp/yakuza.m68k.elf
    1⤵
      PID:720

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads