Analysis

  • max time kernel
    0s
  • max time network
    102s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    08-07-2022 00:23

General

  • Target

    1c441e606233bbac68175731b0f35c0760a2da8e4002ef3ea36f341cf342cc79

  • Size

    180KB

  • MD5

    8f597212e27e1d04c15bd4f03bc57e85

  • SHA1

    450999d9af382b50ff4ec06c35254ace075824c8

  • SHA256

    1c441e606233bbac68175731b0f35c0760a2da8e4002ef3ea36f341cf342cc79

  • SHA512

    75d20520a66c24767b6407c3beb6f2cf63ae5d6a4f039dba79eb5c0c4b4da8c2380bb5468492f58d4287806f9bd2704a726d7713481ee0263ab2898f27bf6dd6

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./1c441e606233bbac68175731b0f35c0760a2da8e4002ef3ea36f341cf342cc79
    ./1c441e606233bbac68175731b0f35c0760a2da8e4002ef3ea36f341cf342cc79
    1⤵
      PID:571
    • /bin/sh
      sh -c "echo ENEMEYBOT V3.1-ALCAPONE hail KEKSEC > /tmp/.pwned"
      1⤵
      • Writes file to tmp directory
      PID:572

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads