Analysis

  • max time kernel
    0s
  • max time network
    124s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-03-2023 17:41

General

  • Target

    4ff59cde02c4fffef74630c766c2e51ae01cf02403407e903af99d01c18da1a8.sh

  • Size

    5KB

  • MD5

    3ce1c9ca35f30e69c9e161e49ea449e8

  • SHA1

    bfad1ae8512173d41430063820951cc2a46a35be

  • SHA256

    4ff59cde02c4fffef74630c766c2e51ae01cf02403407e903af99d01c18da1a8

  • SHA512

    77794168f336a96d7b1a47caccf84e961c6dd00d6d8e0e63a8639bd896c776e98749ef89d61608ca7fbc63599e8485d5b381bdd4601803b4e62f431e87c75ecf

  • SSDEEP

    96:42sQC73wC734/jtxIAEzgsC/ofpC73gTA0zC/Jtg5/JGq:k

Score
5/10

Malware Config

Signatures

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/4ff59cde02c4fffef74630c766c2e51ae01cf02403407e903af99d01c18da1a8.sh
    /tmp/4ff59cde02c4fffef74630c766c2e51ae01cf02403407e903af99d01c18da1a8.sh
    1⤵
    • Writes file to tmp directory
    PID:351

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads