Analysis

  • max time kernel
    0s
  • max time network
    102s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    08-07-2022 00:25

General

  • Target

    59845f9e4a5ad158c9021dbe7dcdec5ec7fe388549c01ca6207badfb24133d2b

  • Size

    185KB

  • MD5

    752b1d9edd385bded4314f0b6e3952d0

  • SHA1

    a1b7e7e3e7fbc470717af316569484ce6f1d14c8

  • SHA256

    59845f9e4a5ad158c9021dbe7dcdec5ec7fe388549c01ca6207badfb24133d2b

  • SHA512

    695bf3952e0cf8845a18e7d6dcf9b571e488194b33eb37b83e04a52b8c0e33ddac4f3be1da67bb243d311efc1f0618327e46a9d6d9b29025af1e7f455cdcd420

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./59845f9e4a5ad158c9021dbe7dcdec5ec7fe388549c01ca6207badfb24133d2b
    ./59845f9e4a5ad158c9021dbe7dcdec5ec7fe388549c01ca6207badfb24133d2b
    1⤵
      PID:571
    • /bin/sh
      sh -c "echo ENEMEYBOT V3.1-ALCAPONE hail KEKSEC > /tmp/.pwned"
      1⤵
      • Writes file to tmp directory
      PID:572

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads