General

  • Target

    bot.x86_64

  • Size

    51KB

  • Sample

    220808-yj1qlafcfp

  • MD5

    d6fa114772e0456c9fa550fb66ce930d

  • SHA1

    8d20e5b79bee753d348dd9e11657f60931fee9fa

  • SHA256

    3e9c0c9663e762a7150223cf6c43878309107b7a6d2356f3f5c9ff89d2b19107

  • SHA512

    0dbd268c2f32d70260c620769cd702dcb18524a9a2f652fb291635717968aa93088dbbf2027b0ddbf97261442833590b05a1875b1715c5dddaf45f22c7377791

Score
5/10

Malware Config

Targets

    • Target

      bot.x86_64

    • Size

      51KB

    • MD5

      d6fa114772e0456c9fa550fb66ce930d

    • SHA1

      8d20e5b79bee753d348dd9e11657f60931fee9fa

    • SHA256

      3e9c0c9663e762a7150223cf6c43878309107b7a6d2356f3f5c9ff89d2b19107

    • SHA512

      0dbd268c2f32d70260c620769cd702dcb18524a9a2f652fb291635717968aa93088dbbf2027b0ddbf97261442833590b05a1875b1715c5dddaf45f22c7377791

    Score
    5/10
    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Discovery

            Execution

              Exfiltration

                Impact

                  Initial Access

                    Lateral Movement

                      Persistence

                        Privilege Escalation