🦠
Schweregrad: MITTEL
Hajime
Typ: Unknown
SHA256
7a656791b445fff02ac6e9dd1081cc265db935476a9ee71139cb6aef52102e2bErste Erfassung1.2.2026
Letzte Aktivitat3.4.2026
Lander3
🎯
5
Mal Erfasst
🌍
3
Lander
🖥️
3
Quell-IPs
🛡️
0
AV-Erkennungen
FamilieHajime
Dateitypelf(225.8 KB)
Erstmals in MB gesehen11.9.2024
Tags
elfHajime
YARA-Regeln (4)
Detect_Malicious_VBScript_Base64
by daniyyell
Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
enterpriseunix2
by Tim Brown @timb_machine
Enterprise UNIX
linux_generic_ipv6_catcher
by @_lubiedo
ELF samples using IPv6 addresses
unixredflags3
by Tim Brown @timb_machine
Hunts for UNIX red flags
Anbieter-Intel (8)
Triage
Detected
InQuest
MALICIOUS
Intezer
malicious
YOROI_YOMI
Malicious File
FileScan-IO
LIKELY_MALICIOUS
CERT-PL_MWDB
Detected
Spamhaus_HBL
Detected
ReversingLabs
MALICIOUS
Herkunftslander
Antivirus-Erkennungen (0)
Keine Antivirus-Erkennungen registriert
Quell-IPs
Schweregrad
45
/100
NiedrigMittelHochKritisch