General

  • Target

    pty4

  • Size

    90KB

  • Sample

    220425-3xlaaadggk

  • MD5

    60f50372901a3ab6be093cb9922fd75c

  • SHA1

    03fabbbc736a5c59b889e3675331c96263d4a4a6

  • SHA256

    16b4093813e2923e9ee70b888f0d50f972ac607253b00f25e4be44993d263bd2

  • SHA512

    480ce401e171d29483b5ddf2b732f8959daba11c8b25538d179cc93795594676aaec3ae078cd312743a9cecf78ba533a58ced339fa63e2b5e53b9077933d0e6b

Malware Config

Targets

    • Target

      pty4

    • Size

      90KB

    • MD5

      60f50372901a3ab6be093cb9922fd75c

    • SHA1

      03fabbbc736a5c59b889e3675331c96263d4a4a6

    • SHA256

      16b4093813e2923e9ee70b888f0d50f972ac607253b00f25e4be44993d263bd2

    • SHA512

      480ce401e171d29483b5ddf2b732f8959daba11c8b25538d179cc93795594676aaec3ae078cd312743a9cecf78ba533a58ced339fa63e2b5e53b9077933d0e6b

    Score
    10/10
    • suricata: ET MALWARE ELF/Muhstik Botnet CnC Activity

      suricata: ET MALWARE ELF/Muhstik Botnet CnC Activity

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Matrix

Tasks