General
-
Target
b
-
Size
449B
-
Sample
220809-nz36jsbeb9
-
MD5
1b6c2e23804389fb3c4a9ddcce882f5d
-
SHA1
0c086d7aa61e5c5a4de5c4e4d769c9c7440c8bbd
-
SHA256
ffe9a29f878e5f4858347527510d65fd8d9d59a071dfb7a5d6ee8ce64394819a
-
SHA512
8a4300b60ee626a8b7a9719ee1b16378802a3989f78ad895c4f3c17d385a0ae76d3113c50095b343f7836db5b7356e31f342afecf199c005d3ee2f26d40d741a
Static task
static1
Behavioral task
behavioral1
Sample
b
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral2
Sample
b
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral3
Sample
b
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral4
Sample
b
Resource
debian9-mipsel-en-20211208
Malware Config
Targets
-
-
Target
b
-
Size
449B
-
MD5
1b6c2e23804389fb3c4a9ddcce882f5d
-
SHA1
0c086d7aa61e5c5a4de5c4e4d769c9c7440c8bbd
-
SHA256
ffe9a29f878e5f4858347527510d65fd8d9d59a071dfb7a5d6ee8ce64394819a
-
SHA512
8a4300b60ee626a8b7a9719ee1b16378802a3989f78ad895c4f3c17d385a0ae76d3113c50095b343f7836db5b7356e31f342afecf199c005d3ee2f26d40d741a
Score9/10-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies hosts file
Adds to hosts file used for mapping hosts to IP addresses.
-
Writes DNS configuration
Writes data to DNS resolver config file.
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates kernel/hardware configuration
Reads contents of /sys virtual filesystem to enumerate system information.
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-