General
-
Target
26c11b6efc493b8ea8dd27d90fd878bc3b475f3d042c56ab737e9d25673d586e
-
Size
72KB
-
Sample
220521-p8r1bacbbp
-
MD5
cd7089bc13ca885f6a81a321570bfe42
-
SHA1
65efda73f22ee95a2430184ece10cf91862f8f91
-
SHA256
26c11b6efc493b8ea8dd27d90fd878bc3b475f3d042c56ab737e9d25673d586e
-
SHA512
9f86cbb4e81ccbfea42bac231c080581542cca8d68454dc3719b9a3867270c0f066261e0d150bce0da7e46586d917b3bfaf429834ce38468b2cba3dfeb1a817b
Static task
static1
Malware Config
Targets
-
-
Target
26c11b6efc493b8ea8dd27d90fd878bc3b475f3d042c56ab737e9d25673d586e
-
Size
72KB
-
MD5
cd7089bc13ca885f6a81a321570bfe42
-
SHA1
65efda73f22ee95a2430184ece10cf91862f8f91
-
SHA256
26c11b6efc493b8ea8dd27d90fd878bc3b475f3d042c56ab737e9d25673d586e
-
SHA512
9f86cbb4e81ccbfea42bac231c080581542cca8d68454dc3719b9a3867270c0f066261e0d150bce0da7e46586d917b3bfaf429834ce38468b2cba3dfeb1a817b
-
suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution
suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution
-
suricata: ET MALWARE Mirai Variant User-Agent (Outbound)
suricata: ET MALWARE Mirai Variant User-Agent (Outbound)
-
Contacts a large (162098) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies hosts file
Adds to hosts file used for mapping hosts to IP addresses.
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-