Analysis

  • max time kernel
    0s
  • max time network
    126s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    27-11-2022 10:58

General

  • Target

    252c836e16050b96419726aadceb9f911f086a94d362ac420c203483215fb008

  • Size

    31KB

  • MD5

    cd33f32cbb03034158c75bc49f95b5c6

  • SHA1

    9404762b4fbd31ea84f1da0456606bebb2bb069d

  • SHA256

    252c836e16050b96419726aadceb9f911f086a94d362ac420c203483215fb008

  • SHA512

    63ce6c7536c866505d3b30e488d983ace5bf8e61a2444d41173a1408971c284a590018457caa4e9745cef94a5705c7318c15a30b505134ba1883233bc505fea1

  • SSDEEP

    384:0xwAZWhiWyQwyKgmcT4G8q5awmMfFRPsxbX68Tr4DvgqRfgdQl0ttTHpf5bUD1G2:028EiWSyXLGMfFNsx768T+vT05uXf

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/252c836e16050b96419726aadceb9f911f086a94d362ac420c203483215fb008
    /tmp/252c836e16050b96419726aadceb9f911f086a94d362ac420c203483215fb008
    1⤵
    • Writes file to tmp directory
    PID:355
    • /usr/local/sbin/hostname
      hostname
      2⤵
        PID:360
      • /usr/local/bin/hostname
        hostname
        2⤵
          PID:360
        • /usr/sbin/hostname
          hostname
          2⤵
            PID:360
          • /usr/bin/hostname
            hostname
            2⤵
              PID:360
            • /sbin/hostname
              hostname
              2⤵
                PID:360
              • /bin/hostname
                hostname
                2⤵
                  PID:360

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads