Analysis

  • max time kernel
    0s
  • max time network
    102s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    08-07-2022 00:26

General

  • Target

    c1566f52e2f69008aa9afd6ea9a82972bdf2a51d90a7a85842858134ea74de40

  • Size

    183KB

  • MD5

    87826000236f45234e67e88acc746daa

  • SHA1

    1cad5545fefc4e0b9ae5206691d3f6614a50f131

  • SHA256

    c1566f52e2f69008aa9afd6ea9a82972bdf2a51d90a7a85842858134ea74de40

  • SHA512

    40c3da3dfa0504bfb8fe0d6922bf0c3b2bd5e3084baf0bfa634ebf4c21d17985b52e08cafa8460f0770192249e48394972de87d4499300825f38abeec3465305

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./c1566f52e2f69008aa9afd6ea9a82972bdf2a51d90a7a85842858134ea74de40
    ./c1566f52e2f69008aa9afd6ea9a82972bdf2a51d90a7a85842858134ea74de40
    1⤵
      PID:571
    • /bin/sh
      sh -c "echo ENEMEYBOT V3.1-ALCAPONE hail KEKSEC > /tmp/.pwned"
      1⤵
      • Writes file to tmp directory
      PID:572

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads