Analysis

  • max time kernel
    0s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240611-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    11/02/2025, 00:53

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/SecuriteInfo.com.Android.BankBot.GoldDigger.9.22065.8614.elf: exec format error

General

  • Target

    SecuriteInfo.com.Android.BankBot.GoldDigger.9.22065.8614.elf

  • Size

    37KB

  • MD5

    ec21ef66242ac1720a99d9f10467441a

  • SHA1

    b6c276352fe9e800f022e3b8301ef23f56864371

  • SHA256

    810b8381fd9bb462079766d2ff50d649fd10c4cff8cdca703e83a1050cd1b60b

  • SHA512

    88b56adec3045b2b67f8534def9d7de1e078759157a72f89d63f664a7aafac1130a1457cd710dcef892f3df0470c7bb3506e7adb3b6720248253cade704b5c7b

  • SSDEEP

    768:j1/VGZ96/1n5D+Yn5/DsAXJ1XSyt5x4p:j1s

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/SecuriteInfo.com.Android.BankBot.GoldDigger.9.22065.8614.elf
    /tmp/SecuriteInfo.com.Android.BankBot.GoldDigger.9.22065.8614.elf
    1⤵
      PID:707

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads