Analysis
-
max time kernel
0s -
max time network
155s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
31-07-2022 11:22
Behavioral task
behavioral1
Sample
ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11
Resource
ubuntu1804-amd64-en-20211208
2 signatures
150 seconds
General
-
Target
ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11
-
Size
93KB
-
MD5
d1f2ba561ca8ab9bdb53f9b3f63a5e91
-
SHA1
c05588bb2345199a6216c606f40ce9ed514fd7de
-
SHA256
ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11
-
SHA512
c47f789bbf7faeca56092201e15dd36c1179ec2d27c4773265c07db8c91ada67774dce0ff1c46336a672f0fd4b562f17a3f39b24d15d678eb32844ee05b74e3c
Score
6/10
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process /tmp/ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11 /tmp/ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11 ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11