General

  • Target

    988e05b7568e013b37740bee511955e280e3bf26e1c31c4c28cc539d2d519811

  • Size

    147KB

  • Sample

    220731-nefvhseffl

  • MD5

    18ff3f726c3f7e82fdc4fa53c0b0501a

  • SHA1

    090f423013c092de7ff84b858699818acda8121f

  • SHA256

    988e05b7568e013b37740bee511955e280e3bf26e1c31c4c28cc539d2d519811

  • SHA512

    b47ca97fa75e7f80e25710aa82c695805415b271b69608580ebc5b7a3082cbafa7387aabd306906ca89a92cacde4092c9354bf586613f9b02d004716746a284e

Score
10/10

Malware Config

Targets

    • Target

      988e05b7568e013b37740bee511955e280e3bf26e1c31c4c28cc539d2d519811

    • Size

      147KB

    • MD5

      18ff3f726c3f7e82fdc4fa53c0b0501a

    • SHA1

      090f423013c092de7ff84b858699818acda8121f

    • SHA256

      988e05b7568e013b37740bee511955e280e3bf26e1c31c4c28cc539d2d519811

    • SHA512

      b47ca97fa75e7f80e25710aa82c695805415b271b69608580ebc5b7a3082cbafa7387aabd306906ca89a92cacde4092c9354bf586613f9b02d004716746a284e

    Score
    7/10
    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks