Sample Name: | Mozi.m |
Analysis ID: | 337641 |
MD5: | 59ce0baba11893f90527fc951ac69912 |
SHA1: | 5857a7dd621c4c3ebb0b5a3bec915d409f70d39f |
SHA256: | 4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7 |
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample |
Source: |
Avira: |
Multi AV Scanner detection for submitted file |
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
Source: |
String found in binary or memory: |
System Summary: |
---|
Sample contains only a LOAD segment without any section mappings |
Source: |
Program segment: |
Yara signature match |
Source: |
Matched rule: |
Source: |
Classification label: |
Data Obfuscation: |
---|
Sample is packed with UPX |
Source: |
String containing UPX found: |
||
Source: |
String containing UPX found: |
||
Source: |
String containing UPX found: |
Malware Analysis System Evasion: |
---|
Uses the "uname" system call to query kernel version information (possible evasion) |
Source: |
Queries kernel information via 'uname': |
Jump to behavior | ||
Source: |
Queries kernel information via 'uname': |
Jump to behavior | ||
Source: |
Queries kernel information via 'uname': |
Jump to behavior |
No Screenshots
No contacted IP infos |
---|