Sample Name: | bin.sh.1 |
Analysis ID: | 327181 |
MD5: | a73ddd6ec22462db955439f665cad4e6 |
SHA1: | ac6962542a4b23ac13bddff22f8df9aeb702ef12 |
SHA256: | b5cf68c7cb5bb2d21d60bf6654926f61566d95bfd7c9f9e182d032f1da5b4605 |
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample |
Source: |
Avira: |
Multi AV Scanner detection for submitted file |
Source: |
Virustotal: |
Perma Link | ||
Source: |
Metadefender: |
Perma Link | ||
Source: |
ReversingLabs: |
Source: |
String found in binary or memory: |
System Summary: |
---|
Sample contains only a LOAD segment without any section mappings |
Source: |
Program segment: |
Yara signature match |
Source: |
Matched rule: |
Source: |
Classification label: |
Data Obfuscation: |
---|
Sample is packed with UPX |
Source: |
String containing UPX found: |
||
Source: |
String containing UPX found: |
||
Source: |
String containing UPX found: |
Malware Analysis System Evasion: |
---|
Uses the "uname" system call to query kernel version information (possible evasion) |
Source: |
Queries kernel information via 'uname': |
||
Source: |
Queries kernel information via 'uname': |
||
Source: |
Queries kernel information via 'uname': |
No Screenshots
No contacted IP infos |
---|