Analysis

  • max time kernel
    0s
  • max time network
    153s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    27-11-2022 18:00

General

  • Target

    44fc2f6ca26daf72a056222416c56c0853018016f1c19bf385e7d48028452ffe

  • Size

    25KB

  • MD5

    688942d8f40c093835695d18306676dc

  • SHA1

    97f2b8593fc4f507c12de53af234cfabc4ae839d

  • SHA256

    44fc2f6ca26daf72a056222416c56c0853018016f1c19bf385e7d48028452ffe

  • SHA512

    806733f8428b027d54f9c93ad17566c9c337c921d09e721b17ca6ff815db0a4771fa1bd6546ef6178f8029b34c10e31beb43f594cea748f6a968fd21f5b51766

  • SSDEEP

    384:fAGsevQ4rDp2q7wuG5q6Q7fy4U+07kL3lT:DsevQ4rDp2q7hG5qJmo0oL3N

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/44fc2f6ca26daf72a056222416c56c0853018016f1c19bf385e7d48028452ffe
    /tmp/44fc2f6ca26daf72a056222416c56c0853018016f1c19bf385e7d48028452ffe
    1⤵
    • Writes file to tmp directory
    PID:355
    • /usr/local/sbin/uname
      uname -a
      2⤵
        PID:359
      • /usr/local/bin/uname
        uname -a
        2⤵
          PID:359
        • /usr/sbin/uname
          uname -a
          2⤵
            PID:359
          • /usr/bin/uname
            uname -a
            2⤵
              PID:359
            • /sbin/uname
              uname -a
              2⤵
                PID:359
              • /bin/uname
                uname -a
                2⤵
                  PID:359

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads