Analysis
-
max time kernel
0s -
max time network
295s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
27-09-2022 08:10
Behavioral task
behavioral1
Sample
x.rar
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
300 seconds
General
-
Target
x.rar
-
Size
5.7MB
-
MD5
33a8969da9cfb35b2a3aed88c2baf32b
-
SHA1
54805103e4f430a8b0366ca6fcda55c2d37660e5
-
SHA256
34bfddb2ca2b491f7599bc90e15398b56f6e41b13c341944197c37199b062725
-
SHA512
5f1ec9300380f46ba95346e8790c2bd1a698495defae355e8cfc5a643022074ca9149cb5590642b9d12d12e51f2ef6223103dd5ee81bc554bb669a3d2d66d1a5
-
SSDEEP
98304:EABHBsGbwGjSj/jM8MMM8MMMMMwMMwbvUvUvkGjrGjj7pXDNRKL7FtlrI47wrfNl:5TsfNGmyrjbmBjLjci3I
Score
5/10
Malware Config
Signatures
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
x.rardescription ioc process /tmp/config.json /tmp/config.json x.rar