Analysis

  • max time kernel
    0s
  • max time network
    102s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    18-05-2022 21:24

General

  • Target

    bf8dc5eca570a1a0d702303547b736cff9df54c31745dde90dfc429580c0cc28

  • Size

    8.6MB

  • MD5

    1f29fc7e6e27a5a7e92ce400cf2eaf2f

  • SHA1

    901d534f3fe2a57f660a9e344734f51fd9fbd869

  • SHA256

    bf8dc5eca570a1a0d702303547b736cff9df54c31745dde90dfc429580c0cc28

  • SHA512

    ab2e96abaa5d543656a72f3f97b8ae4fb857e8ceb0b73fbcf4f22e45eb39aeb95a61e6d5558c58ee32bfcafed381fb84ea48bf413875d23d98f634c6c3c45aea

Score
9/10

Malware Config

Signatures

  • Attempts to identify hypervisor via CPU configuration 1 TTPs 1 IoCs

    Checks CPU information for indicators that the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 2 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 64 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 4 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./bf8dc5eca570a1a0d702303547b736cff9df54c31745dde90dfc429580c0cc28
    ./bf8dc5eca570a1a0d702303547b736cff9df54c31745dde90dfc429580c0cc28
    1⤵
    • Attempts to identify hypervisor via CPU configuration
    • Reads CPU attributes
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:571

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads