File a1c14e99cc8490a4d503ffd660e2d881fa5d766a4288eea328f73bd8ee99078d Summary

Analyse score

7 / 14

7 antivirus venders flagged
this file as malicious

Last scanned

First submission

Basic properties

CRC32

0x76b4c066

MD5

dd80ff5207f33b03479354ddc1169099

Magic

ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped

SHA1

a369453c8a93c8d0fae1c0e0ee2d7d763902f2b6

SHA256

a1c14e99cc8490a4d503ffd660e2d881fa5d766a4288eea328f73bd8ee99078d

SHA512

b702c4aa388d70dcec559aa1ceb7cf1d367d84220f5a61468b3040e9639a2f2f497e3533b51443346082ccf78f5d5ba84082fe8a23da70f8192ac63b657c62cf

SSDeep

1536:OIA+bPy8vrGRqfGjdId71WUTuU0Nscgyw:OH+TyEySGjdIJ1Puocg

Size

49.38KB

Packer
  • ELF64: Nothing found
TrID
  • 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
  • 49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Tags

ExifTool File Metadata

CpuArchitecture

64 bit

CpuByteOrder

Little endian

CpuType

AMD x86-64

ExifToolVersionNumber

12.64

FileSize

51 kB

FileType

ELF executable

FileTypeExtension

MimeType

application/octet-stream

ObjectFileType

Executable file

Submissions

Published Name Source Country
x86 web undefined

Indicators

Description Severity Category Module
Malware detection of a yara signature: Win32/WannaCry
malicious
Sandbox Detection Behavior
Communicates over HTTP with a low reputation domain
informational
C2 Behavior
Deletes itself after process termination
suspicious
Stealth Behavior
Write a file to the startup folder
suspicious
Persistence Behavior
Check for the existence of Virtual Machines
suspicious
Signature Yara

🚀 Coming soon!

Virtual Screens

🚀 Coming soon!