General
-
Target
jewn.sh
-
Size
1KB
-
Sample
230208-hagy5ahe22
-
MD5
2097bb27333c25ce9708e90de1604d99
-
SHA1
5e26a804a9ee8922e12e8eb3aab85cdd83235ebb
-
SHA256
fc888d0e281f668aa43f5b266eaf0f69edd56eb7c47d32a005de9ab268fc8645
-
SHA512
7417d2e7a5c2266038244ccf0c9efcc6007766e10221f8fc65f74bc5559e060d0d0ee771cd8eaaf9db5269d4cf1af84bc07f65dff60a89d64565a721dd64eb53
Static task
static1
Behavioral task
behavioral1
Sample
jewn.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral2
Sample
jewn.sh
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral3
Sample
jewn.sh
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral4
Sample
jewn.sh
Resource
debian9-mipsel-20221111-en
Malware Config
Targets
-
-
Target
jewn.sh
-
Size
1KB
-
MD5
2097bb27333c25ce9708e90de1604d99
-
SHA1
5e26a804a9ee8922e12e8eb3aab85cdd83235ebb
-
SHA256
fc888d0e281f668aa43f5b266eaf0f69edd56eb7c47d32a005de9ab268fc8645
-
SHA512
7417d2e7a5c2266038244ccf0c9efcc6007766e10221f8fc65f74bc5559e060d0d0ee771cd8eaaf9db5269d4cf1af84bc07f65dff60a89d64565a721dd64eb53
Score5/10-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-