Analysis
-
max time kernel
0s -
max time network
103s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
submitted
16-05-2022 22:17
Behavioral task
behavioral1
Sample
ed1e49cb05c375cc1149c349880ed077b6ee75cb7e5c6cae9cbd4bd086950c93
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
ed1e49cb05c375cc1149c349880ed077b6ee75cb7e5c6cae9cbd4bd086950c93
-
Size
7.2MB
-
MD5
8d2a121534f141e72fa9a8b2e1f15ae7
-
SHA1
21e9811b36c47d5c1533486cec83ba6eaf6e6461
-
SHA256
ed1e49cb05c375cc1149c349880ed077b6ee75cb7e5c6cae9cbd4bd086950c93
-
SHA512
db4c57c49f8ade7133cd94b84d41aa1dc2415ea687fadb680be15e1edb94418d669a8d6cf38d78b31bb0bbaabee1dae2610cbc7456384c64161b4298d3210be1
Score
5/10
Malware Config
Signatures
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
ed1e49cb05c375cc1149c349880ed077b6ee75cb7e5c6cae9cbd4bd086950c93description ioc process /tmp/config.json /tmp/config.json ed1e49cb05c375cc1149c349880ed077b6ee75cb7e5c6cae9cbd4bd086950c93