General

  • Target

    Sandy

  • Size

    1.2MB

  • Sample

    210211-gk3ya1awpn

  • MD5

    44cff208d129e84af8e3c814cad46909

  • SHA1

    a79e903a5d44f1ec5dbc4f7c348bfbb78b1a986a

  • SHA256

    8d8f1fe0fc76313935152b83eed2274d5c7a733ed484558b54b4129dc04ab844

  • SHA512

    52de154b7ae67c791405f55544a1ffcc418cc19b2299de4b9889a1ee5f523ea582c756aa220e3f5dc3fcb2fc82075be988ba45f1caddd62f6f6a4d309af52ee4

Score
10/10

Malware Config

Targets

    • Target

      Sandy

    • Size

      1.2MB

    • MD5

      44cff208d129e84af8e3c814cad46909

    • SHA1

      a79e903a5d44f1ec5dbc4f7c348bfbb78b1a986a

    • SHA256

      8d8f1fe0fc76313935152b83eed2274d5c7a733ed484558b54b4129dc04ab844

    • SHA512

      52de154b7ae67c791405f55544a1ffcc418cc19b2299de4b9889a1ee5f523ea582c756aa220e3f5dc3fcb2fc82075be988ba45f1caddd62f6f6a4d309af52ee4

    Score
    9/10
    • Writes file to system bin folder

    • Write file to user bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks