🦠
Severity: MEDIUM
Hajime
Type: Unknown
SHA256
7a656791b445fff02ac6e9dd1081cc265db935476a9ee71139cb6aef52102e2bFirst Capture2/1/2026
Last Activity4/3/2026
Countries3
🎯
5
Times Captured
🌍
3
Countries
🖥️
3
Source IPs
🛡️
0
AV Detections
FamilyHajime
File Typeelf(225.8 KB)
First seen in MB9/11/2024
Tags
elfHajime
YARA Rules (4)
Detect_Malicious_VBScript_Base64
by daniyyell
Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.
enterpriseunix2
by Tim Brown @timb_machine
Enterprise UNIX
linux_generic_ipv6_catcher
by @_lubiedo
ELF samples using IPv6 addresses
unixredflags3
by Tim Brown @timb_machine
Hunts for UNIX red flags
Vendor Intel (8)
Triage
Detected
InQuest
MALICIOUS
Intezer
malicious
YOROI_YOMI
Malicious File
FileScan-IO
LIKELY_MALICIOUS
CERT-PL_MWDB
Detected
Spamhaus_HBL
Detected
ReversingLabs
MALICIOUS
Countries of Origin
Antivirus Detections (0)
No antivirus detections recorded
Source IPs
Severity
45
/100
LowMediumHighCritical