General
-
Target
Sandy
-
Size
1.2MB
-
Sample
210211-gk3ya1awpn
-
MD5
44cff208d129e84af8e3c814cad46909
-
SHA1
a79e903a5d44f1ec5dbc4f7c348bfbb78b1a986a
-
SHA256
8d8f1fe0fc76313935152b83eed2274d5c7a733ed484558b54b4129dc04ab844
-
SHA512
52de154b7ae67c791405f55544a1ffcc418cc19b2299de4b9889a1ee5f523ea582c756aa220e3f5dc3fcb2fc82075be988ba45f1caddd62f6f6a4d309af52ee4
Static task
static1
Behavioral task
behavioral1
Sample
Sandy
Resource
ubuntu-amd64
Behavioral task
behavioral2
Sample
Sandy
Resource
debian9-mipsel
Behavioral task
behavioral3
Sample
Sandy
Resource
debian9-mipsbe
Malware Config
Targets
-
-
Target
Sandy
-
Size
1.2MB
-
MD5
44cff208d129e84af8e3c814cad46909
-
SHA1
a79e903a5d44f1ec5dbc4f7c348bfbb78b1a986a
-
SHA256
8d8f1fe0fc76313935152b83eed2274d5c7a733ed484558b54b4129dc04ab844
-
SHA512
52de154b7ae67c791405f55544a1ffcc418cc19b2299de4b9889a1ee5f523ea582c756aa220e3f5dc3fcb2fc82075be988ba45f1caddd62f6f6a4d309af52ee4
Score9/10-
Writes file to system bin folder
-
Write file to user bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-