Analysis

  • max time kernel
    0s
  • max time network
    124s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20221111-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20221111-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    19-11-2022 08:54

General

  • Target

    .python/ubuntu

  • Size

    1KB

  • MD5

    07f6dd9f5b022262665d8cc0f5037086

  • SHA1

    3466c31fc60279e6758906272fa1724fb71384c2

  • SHA256

    462b92c91fbc63e60ddf7c5dd59b12ec37d7bae767ac2c28b69d928782aae7e4

  • SHA512

    2976d6b23821f5d97d8a07014ea54053391ccfeb074666fd56f900c2fe1f03dd9d3a4f7d6738a5587e4255487f0474985d375fe9420dfd3323722b3265586e13

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/.python/ubuntu
    /tmp/.python/ubuntu
    1⤵
    • Writes file to tmp directory
    PID:332
    • ./c
      ./c 22 -b -i eth0 -s 10
      2⤵
        PID:333
      • /bin/sleep
        sleep 2
        2⤵
          PID:334
        • ./prg
          ./prg -I bios.txt -u ubuntu -L ubpass.txt -o vuln.txt
          2⤵
            PID:339
          • /bin/sleep
            sleep 5
            2⤵
              PID:340
            • /bin/rm
              rm -rf "*.find.22" bios.txt
              2⤵
                PID:341
              • /bin/sleep
                sleep 1
                2⤵
                  PID:342
                • /bin/cat
                  cat vuln.txt
                  2⤵
                    PID:343

                Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads