Analysis

  • max time kernel
    0s
  • max time network
    103s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    08-07-2022 00:21

General

  • Target

    563cb8c26e7a5867f24f3ba21ad1d7cf923703e02788a96984c6a7f38f2d481e

  • Size

    2.3MB

  • MD5

    e2aaa15ab409d60aed6d570309a74197

  • SHA1

    cd589d31ba6f7642f0108c62908beb9eab9ac2be

  • SHA256

    563cb8c26e7a5867f24f3ba21ad1d7cf923703e02788a96984c6a7f38f2d481e

  • SHA512

    86dd3411e9d8afeaa816cc2a2a3121db3817e19de5f51a261a86565e8d74eea7ec4e00187fa29660f1a1cd371b2ac185d6561c0273bcc6173ef0ae20e4c69307

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./563cb8c26e7a5867f24f3ba21ad1d7cf923703e02788a96984c6a7f38f2d481e
    ./563cb8c26e7a5867f24f3ba21ad1d7cf923703e02788a96984c6a7f38f2d481e
    1⤵
      PID:592
    • /bin/sh
      sh -c "echo ENEMEYBOT V3.1-ALCAPONE hail KEKSEC > /tmp/.pwned"
      1⤵
      • Writes file to tmp directory
      PID:593

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads