Analysis
-
max time kernel
0s -
max time network
141s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
31-07-2022 11:21
Behavioral task
behavioral1
Sample
df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd
Resource
ubuntu1804-amd64-en-20211208
1 signatures
150 seconds
General
-
Target
df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd
-
Size
91KB
-
MD5
40236df24deb0eea4094872ee7b3084a
-
SHA1
ad2b4056f858c3cd6c85eb8c18aedcbd0d52463e
-
SHA256
df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd
-
SHA512
b17f6dc75d26412ea466308279d562a511b293a482c746575bf40a2eab70b29697a5035d9e500428cefa1a1f70cfc69d8c4eec75866b361b7f575671210972a3
Score
5/10
Malware Config
Signatures
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cddescription ioc Process /tmp/df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd /tmp/df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd