General
-
Target
467856f2aeefb9a430c6c74960c78304
-
Size
26KB
-
Sample
220812-zyandsccd2
-
MD5
467856f2aeefb9a430c6c74960c78304
-
SHA1
5ed9944e25b14355861681037b79605e6d34d716
-
SHA256
f5647380e762a1effc0205213029af896c75d0704a7ffe595978ba5e4f45b485
-
SHA512
40175d94f685bc4a8a9e0510509c82498f380a86e642b5ebb455db51ecfc4c17360e37990ef6e50e100ab5f9c55d8a5ab3dafb755fd7ca17e1d5361cd0e76700
Static task
static1
Behavioral task
behavioral1
Sample
467856f2aeefb9a430c6c74960c78304
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Targets
-
-
Target
467856f2aeefb9a430c6c74960c78304
-
Size
26KB
-
MD5
467856f2aeefb9a430c6c74960c78304
-
SHA1
5ed9944e25b14355861681037b79605e6d34d716
-
SHA256
f5647380e762a1effc0205213029af896c75d0704a7ffe595978ba5e4f45b485
-
SHA512
40175d94f685bc4a8a9e0510509c82498f380a86e642b5ebb455db51ecfc4c17360e37990ef6e50e100ab5f9c55d8a5ab3dafb755fd7ca17e1d5361cd0e76700
Score9/10-
Contacts a large (365156) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-