Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    07/03/2025, 13:52

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/uYtea.spc.elf: exec format error

General

  • Target

    uYtea.spc.elf

  • Size

    61KB

  • MD5

    1abb65fc7f60b75b87a11f3b1c41e54e

  • SHA1

    581d86b4fe2833d6ab4658ffdd71a1bc725ac820

  • SHA256

    5cde724b378449c64ce0bb2c27d5b6b624ede7bf2f9bae15cdbc9c23a1a42897

  • SHA512

    dc35133980d113a6eba317e584fcaf89c5bbad3fb64d01481471e139eb43aceb35f0d7afc04ff8386e3b7fdea9845203e16c40787053b7ec782b89f3ae59e924

  • SSDEEP

    1536:wwkfZJxFtojQlvnrj/Byzn7dke4tuItYZ6w8+BwQFz0XYIfiV0/:BkfZJxFtojQlvnrj/a4LYZ7UYN8

Score
1/10

Malware Config

Signatures

Processes

  • /tmp/uYtea.spc.elf
    /tmp/uYtea.spc.elf
    1⤵
      PID:645

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads