Analysis

  • max time kernel
    0s
  • max time network
    103s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    08-07-2022 00:21

General

  • Target

    07177233647e1ff382dde4803bc0651e5b052112a5450bd78858d945c4bc2e0b

  • Size

    2.3MB

  • MD5

    c3ae0f39436238d97bbf731c6c139778

  • SHA1

    dd7eb808a4fa877a79a4a206e6e860bbba8964ce

  • SHA256

    07177233647e1ff382dde4803bc0651e5b052112a5450bd78858d945c4bc2e0b

  • SHA512

    b7cd881cb3ad49b4d3dfe05e683d15a39b181f8f6183ae9cee8c1baeae51702495b13c5630efb057f3017d1de9f181c0add59eeb4afdfc24223c2ddb09d93b70

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./07177233647e1ff382dde4803bc0651e5b052112a5450bd78858d945c4bc2e0b
    ./07177233647e1ff382dde4803bc0651e5b052112a5450bd78858d945c4bc2e0b
    1⤵
      PID:577
    • /bin/sh
      sh -c "echo ENEMEYBOT V3.1-ALCAPONE hail KEKSEC > /tmp/.pwned"
      1⤵
      • Writes file to tmp directory
      PID:578

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads