Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    11-01-2025 22:47

General

  • Target

    yakuza.mips.elf

  • Size

    134KB

  • MD5

    06222f875f70c70477d06d049112bf7c

  • SHA1

    bbaa1e534a2f7be7a6fbaa041f43aaf9e78fd790

  • SHA256

    2ce0396ec230458f5613ad52e42a6a1d8a6f073a80c42fa601ddb6babeb8701e

  • SHA512

    144254a76e3cfaa965f4c8ac3c261b2fb1b3b34e79ee8da691a2ff9b31e30a1cd2b8d4fb59b7cbb9bfa1901f4f48559b3e724cabc72b2e149ac271d312392f28

  • SSDEEP

    3072:LDfnKAHmKSI2Sx4fJ5wWaplkpPzmjVue+nm2sbmoPR6mkSl5hqjuGUOhfF3xemqq:Lj7Z6Kl5hqfUYF3xemqY1wuBmvm

Score
4/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/yakuza.mips.elf
    /tmp/yakuza.mips.elf
    1⤵
    • Changes its process name
    • System Network Configuration Discovery
    PID:707

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads