General

  • Target

    pty8

  • Size

    1.9MB

  • Sample

    220425-3xn16shga8

  • MD5

    71a0b26e851ec57a16a0a8038f515ad6

  • SHA1

    5907e161bd31cba0cd932253fa1e3b7590450b1f

  • SHA256

    7c4e9e95a27147623ec5b3be81c76c131a0871d75f50b148b93e88ef6ee0b468

  • SHA512

    c8fb784b28b691ac255cd1391bdcdf84f35d306c86b082df6376cdbfcd832bbc538db6eda041e0d14b8d99a769a5de3f7e2a734145df2414d38cd0cf98120adc

Score
10/10

Malware Config

Targets

    • Target

      pty8

    • Size

      1.9MB

    • MD5

      71a0b26e851ec57a16a0a8038f515ad6

    • SHA1

      5907e161bd31cba0cd932253fa1e3b7590450b1f

    • SHA256

      7c4e9e95a27147623ec5b3be81c76c131a0871d75f50b148b93e88ef6ee0b468

    • SHA512

      c8fb784b28b691ac255cd1391bdcdf84f35d306c86b082df6376cdbfcd832bbc538db6eda041e0d14b8d99a769a5de3f7e2a734145df2414d38cd0cf98120adc

    Score
    5/10
    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Matrix

Tasks