General
-
Target
pty4
-
Size
90KB
-
Sample
220425-3xlaaadggk
-
MD5
60f50372901a3ab6be093cb9922fd75c
-
SHA1
03fabbbc736a5c59b889e3675331c96263d4a4a6
-
SHA256
16b4093813e2923e9ee70b888f0d50f972ac607253b00f25e4be44993d263bd2
-
SHA512
480ce401e171d29483b5ddf2b732f8959daba11c8b25538d179cc93795594676aaec3ae078cd312743a9cecf78ba533a58ced339fa63e2b5e53b9077933d0e6b
Static task
static1
Behavioral task
behavioral1
Sample
pty4
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Targets
-
-
Target
pty4
-
Size
90KB
-
MD5
60f50372901a3ab6be093cb9922fd75c
-
SHA1
03fabbbc736a5c59b889e3675331c96263d4a4a6
-
SHA256
16b4093813e2923e9ee70b888f0d50f972ac607253b00f25e4be44993d263bd2
-
SHA512
480ce401e171d29483b5ddf2b732f8959daba11c8b25538d179cc93795594676aaec3ae078cd312743a9cecf78ba533a58ced339fa63e2b5e53b9077933d0e6b
Score10/10-
suricata: ET MALWARE ELF/Muhstik Botnet CnC Activity
suricata: ET MALWARE ELF/Muhstik Botnet CnC Activity
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-