Analysis
-
max time kernel
145s -
max time network
145s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
11-01-2025 22:47
Behavioral task
behavioral1
Sample
yakuza.mips.elf
Resource
debian9-mipsbe-20240611-en
2 signatures
150 seconds
General
-
Target
yakuza.mips.elf
-
Size
134KB
-
MD5
06222f875f70c70477d06d049112bf7c
-
SHA1
bbaa1e534a2f7be7a6fbaa041f43aaf9e78fd790
-
SHA256
2ce0396ec230458f5613ad52e42a6a1d8a6f073a80c42fa601ddb6babeb8701e
-
SHA512
144254a76e3cfaa965f4c8ac3c261b2fb1b3b34e79ee8da691a2ff9b31e30a1cd2b8d4fb59b7cbb9bfa1901f4f48559b3e724cabc72b2e149ac271d312392f28
-
SSDEEP
3072:LDfnKAHmKSI2Sx4fJ5wWaplkpPzmjVue+nm2sbmoPR6mkSl5hqjuGUOhfF3xemqq:Lj7Z6Kl5hqfUYF3xemqY1wuBmvm
Score
4/10
Malware Config
Signatures
-
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 707 yakuza.mips.elf -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 707 yakuza.mips.elf