Sample name: | linux_amd64.elf |
Analysis ID: | 1562739 |
MD5: | 31c17748082dea13683a54b0937b9169 |
SHA1: | 274781228fc66e3b8d6b8dfff630a93cc5aadb1d |
SHA256: | 91166d1b2860195fdedbf252555923ad5e6ee9bbac1be945428a7776d46fa7b2 |
Tags: | elfuser-abuse_ch |
Infos: |
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Chaos | Multi-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji. | No Attribution |
|
AV Detection |
---|
Source: |
ReversingLabs: |
Source: |
Joe Sandbox ML: |
Source: |
Reads CPU info from /sys: |
Jump to behavior | ||
Source: |
Reads CPU info from /sys: |
Jump to behavior |
Networking |
---|
Source: |
TCP traffic: |
Source: |
Network traffic detected: |
||
Source: |
Network traffic detected: |
Source: |
TCP traffic: |
Source: |
Reads hosts file: |
Jump to behavior |
Source: |
TCP traffic: |
||
Source: |
TCP traffic: |
||
Source: |
TCP traffic: |
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
UDP traffic detected without corresponding DNS query: |
||
Source: |
UDP traffic detected without corresponding DNS query: |
||
Source: |
UDP traffic detected without corresponding DNS query: |
||
Source: |
UDP traffic detected without corresponding DNS query: |
Source: |
HTTP traffic detected: |
Source: |
String found in binary or memory: |