ScreenShot
Created | 2023.03.04 17:50 | Machine | s1_win7_x6401 |
Filename | i | ||
Type | ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 42 detected (Trojan.Linux.GenericKD.50294160, Backdoor.Linux.Mirai.wz, Unix.Trojan.Mirai-7100807-0, Linux/DDoS-CI, Backdoor.Mirai/Linux!1.DDF1 (CLASSIC), Detected, Backdoor.Linux.fnqr, Trojan.Malware.121218.susgen, Linux.Mirai, Trojan.Mirai.Linux.80045, Backdoor.Linux.MIRAI.USELVHC22, Trojan/Linux.Mirai.307960, Linux.Packer.Patched.UPX, Linux.Siggen.4218, Linux/Mozi.A, E32/Trojan.PVIB-4, Linux.Mirai.HGK, Trojan:Linux/Dakkatoni.A!MTB, GenericRXMU-VU!D533E4A1985E, Trojan/Linux.Mirai.a, Suspicious.XOR_Encoded.bot!yf, Trojan.Linux.GenericKD.50294160 (B), Trojan.Mirai.joimgn, Trojan.Linux.Generic, malware (ai score=100), Trojan.Linux.Generic.D2FF6D90, EXP/ELF.Agent.Gen.L, Trojan.Linux.Linux.4!c, ELF/Mozi.1962!tr, ELF:Agent-BSC [Cryp, ELF:Mirai-UM [Trj, HEUR:Backdoor.Linux.Mirai.b, Malicious (score: 99), Backdoor.Linux.Mirai.Vlml) | ||
md5 | d533e4a1985ee9df9eb60e8bc4e0904d | ||
sha256 | 606d278b2e75119296bf48721ae72deec87912742ce4d9920bf565521de4dcb0 | ||
ssdeep | 6144:p3lOYoaja8xzx/0wsxzSiOabE5wKSDP99zBa77oNsKqqfPqOJ:p1CG/jsxzXOabEDSDP99zBa/HKqoPqOJ | ||
imphash | |||
impfuzzy |
Network IP location
Signature (9cnts)
Level | Description |
---|---|
watch | Communicates with host for which no DNS query was performed |
watch | File has been identified by 16 AntiVirus engines on VirusTotal as malicious |
watch | One or more non-whitelisted processes were created |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Modifies the ZoneTransfer.ZoneID in Zone.Identifier ADS |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
Rules (8cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | anti_dbg | Checks if being debugged | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |