Analysis

  • max time kernel
    0s
  • max time network
    103s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    08/07/2022, 00:22

General

  • Target

    5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a

  • Size

    2.3MB

  • MD5

    05ba70eeccc4ed365a780417beb96d24

  • SHA1

    bfaf56962d2e3b17f2b482979cb83bd4a6fd64f3

  • SHA256

    5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a

  • SHA512

    1e27cfafc371de7d5231700dfd11b3e180a2f00c4fd09c60d73590697034d4912d06f6d35ce57e1226995981133341c7c3f96b4c373dc6118ed505019f696f31

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a
    ./5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a
    1⤵
      PID:581
    • /bin/sh
      sh -c "echo ENEMEYBOT V3.1-ALCAPONE hail KEKSEC > /tmp/.pwned"
      1⤵
      • Writes file to tmp directory
      PID:582

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads