Sample Name: | Mozi.m |
Analysis ID: | 451140 |
MD5: | 1af4de72c3ecf9b8b42f585232da79ff |
SHA1: | c7329de7741529b10c49a0aae595fdbf6ed59374 |
SHA256: | ad23d3c3a70c722f36f005a0660fe2dbf6385fc6da6c799d0feb81599dd7e341 |
Infos: |
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
AV Detection: |
|
---|
Antivirus / Scanner detection for submitted sample |
Source: |
Avira: |
Multi AV Scanner detection for submitted file |
Source: |
Virustotal: |
Perma Link | ||
Source: |
Metadefender: |
Perma Link | ||
Source: |
ReversingLabs: |
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
System Summary: |
|
---|
Sample contains only a LOAD segment without any section mappings |
Source: |
Program segment: |
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable |
Source: |
String containing 'busybox' found: |
||
Source: |
String containing 'busybox' found: |
Sample contains strings that are potentially command strings |
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
||
Source: |
Potential command found: |
Yara signature match |
Source: |
Matched rule: |
Source: |
Classification label: |
Data Obfuscation: |
|
---|
Sample is packed with UPX |
Source: |
String containing UPX found: |
||
Source: |
String containing UPX found: |
||
Source: |
String containing UPX found: |
Malware Analysis System Evasion: |
|
---|
Uses the "uname" system call to query kernel version information (possible evasion) |
Source: |
Queries kernel information via 'uname': |
Jump to behavior | ||
Source: |
Queries kernel information via 'uname': |
Jump to behavior | ||
Source: |
Queries kernel information via 'uname': |
Jump to behavior |
No Screenshots
No contacted IP infos |
---|