General

  • Target

    26c11b6efc493b8ea8dd27d90fd878bc3b475f3d042c56ab737e9d25673d586e

  • Size

    72KB

  • Sample

    220521-p8r1bacbbp

  • MD5

    cd7089bc13ca885f6a81a321570bfe42

  • SHA1

    65efda73f22ee95a2430184ece10cf91862f8f91

  • SHA256

    26c11b6efc493b8ea8dd27d90fd878bc3b475f3d042c56ab737e9d25673d586e

  • SHA512

    9f86cbb4e81ccbfea42bac231c080581542cca8d68454dc3719b9a3867270c0f066261e0d150bce0da7e46586d917b3bfaf429834ce38468b2cba3dfeb1a817b

Malware Config

Targets

    • Target

      26c11b6efc493b8ea8dd27d90fd878bc3b475f3d042c56ab737e9d25673d586e

    • Size

      72KB

    • MD5

      cd7089bc13ca885f6a81a321570bfe42

    • SHA1

      65efda73f22ee95a2430184ece10cf91862f8f91

    • SHA256

      26c11b6efc493b8ea8dd27d90fd878bc3b475f3d042c56ab737e9d25673d586e

    • SHA512

      9f86cbb4e81ccbfea42bac231c080581542cca8d68454dc3719b9a3867270c0f066261e0d150bce0da7e46586d917b3bfaf429834ce38468b2cba3dfeb1a817b

    Score
    10/10
    • suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution

      suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution

    • suricata: ET MALWARE Mirai Variant User-Agent (Outbound)

      suricata: ET MALWARE Mirai Variant User-Agent (Outbound)

    • Contacts a large (162098) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Tasks