Analysis

  • max time kernel
    0s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240418-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    11-01-2025 22:47

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/yakuza.sh4.elf: exec format error

General

  • Target

    yakuza.sh4.elf

  • Size

    94KB

  • MD5

    c2e44493a156e3d840a282a6d6cfdceb

  • SHA1

    eff4a0021dc2ecba448342daa5ff5eae7a73f7a8

  • SHA256

    84dc3fda3b04da894cbce3b97b9c37ed9bfce988d2b4d8797759949126a2ef24

  • SHA512

    a4387c431c68940f43ae94df642e7df388a560c9a6624b1dcd4384dfbe06aab6e03b851d30975dbc9b7f454d7be43e559e8c07b3194058e318b54c8924c58c49

  • SSDEEP

    1536:1GkrlR7L5uT0MeKErmIThCUeHCCmeCi5hYKOAH/RMnhR09TjUeQfXm:QU7XSERhCU7ef5hYKFHJMhR09TQeQfXm

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/yakuza.sh4.elf
    /tmp/yakuza.sh4.elf
    1⤵
      PID:701

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads