General

  • Target

    new.sh

  • Size

    1KB

  • Sample

    220817-18h8ysdecm

  • MD5

    2e5a7bbf887155184d5683eb566049d0

  • SHA1

    d7e39711ef6ff06b5317d717bd31ebcbc63c38b4

  • SHA256

    f2eec1a23e49f45d880e9c5e73e3922421194156c016cbf4fe8a82008d2c5c80

  • SHA512

    25f88d5c776ae319d250ff0d8b75db08ac8517b1503c3309ce28456e32aada9504a486ce9ee7b61274ff4f2284fecac2e7289b0ae291393ee48f5df4f8be9951

Score
9/10

Malware Config

Targets

    • Target

      new.sh

    • Size

      1KB

    • MD5

      2e5a7bbf887155184d5683eb566049d0

    • SHA1

      d7e39711ef6ff06b5317d717bd31ebcbc63c38b4

    • SHA256

      f2eec1a23e49f45d880e9c5e73e3922421194156c016cbf4fe8a82008d2c5c80

    • SHA512

      25f88d5c776ae319d250ff0d8b75db08ac8517b1503c3309ce28456e32aada9504a486ce9ee7b61274ff4f2284fecac2e7289b0ae291393ee48f5df4f8be9951

    Score
    9/10
    • Contacts a large (294562) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Tasks