Analysis

  • max time kernel
    0s
  • max time network
    23s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    08-07-2022 03:18

General

  • Target

    4235a1cc672e7107e15c796dde98ce62d965ecf90f390c08db5b2d0cc4d100d2

  • Size

    611KB

  • MD5

    46dce1e4a92eaab92b79ddae319c011a

  • SHA1

    2ad5643c3b1ec27e89c934a94df1c0e10d7c13d0

  • SHA256

    4235a1cc672e7107e15c796dde98ce62d965ecf90f390c08db5b2d0cc4d100d2

  • SHA512

    b9d5efafeb61e79e788502821ba97f96a2b843f4b8c6d237135bb63c82efd1ebade8294d1f0cb6830b338f500ac1ef9b8cc6518fe3030f5905fab31378213015

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE DDoS.XOR Checkin

    suricata: ET MALWARE DDoS.XOR Checkin

  • Writes file to system bin folder 1 TTPs 3 IoCs
  • Creates/modifies Cron job 1 TTPs 2 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Modifies init.d 1 TTPs 1 IoCs

    Adds/modifies system service, likely for persistence.

  • Modifies rc script 1 TTPs 17 IoCs

    Adding/modifying system rc scripts is a common persistence mechanism.