General
-
Target
16d195917a3418c17e4d32c17c676351
-
Size
2.8MB
-
Sample
231219-2h486sdcd6
-
MD5
16d195917a3418c17e4d32c17c676351
-
SHA1
919a04b017920186f0342f7ffdc65f5202da518d
-
SHA256
ba7ea424d66262f02f68c3bfcd1e768bb9c83770e5e2a6da9e7df1844b4e8e3c
-
SHA512
c3686f8c1d1bdcbde65c1d00d1032b9887d381c413fa15a20c169c75d947f7a38342ba54b429eaffbd5856e7c2f58d2bb2be4c53d36f95d1622e5a1143c8778a
-
SSDEEP
49152:AiPwlMnTTUynSYL6tTLqvWEv9kTYqVcu2BnSUlfXHg/zCV7nE7psIgrEkUa:/P0wUyL2tTLquw9Z0cbXALCV7nE4Eha
Static task
static1
Behavioral task
behavioral1
Sample
16d195917a3418c17e4d32c17c676351
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Targets
-
-
Target
16d195917a3418c17e4d32c17c676351
-
Size
2.8MB
-
MD5
16d195917a3418c17e4d32c17c676351
-
SHA1
919a04b017920186f0342f7ffdc65f5202da518d
-
SHA256
ba7ea424d66262f02f68c3bfcd1e768bb9c83770e5e2a6da9e7df1844b4e8e3c
-
SHA512
c3686f8c1d1bdcbde65c1d00d1032b9887d381c413fa15a20c169c75d947f7a38342ba54b429eaffbd5856e7c2f58d2bb2be4c53d36f95d1622e5a1143c8778a
-
SSDEEP
49152:AiPwlMnTTUynSYL6tTLqvWEv9kTYqVcu2BnSUlfXHg/zCV7nE7psIgrEkUa:/P0wUyL2tTLquw9Z0cbXALCV7nE4Eha
Score9/10-
Contacts a large (5904) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies the dynamic linker configuration file
Malware can modify the configuration file of the dynamic linker to preload malicous libraries with every executed process.
-
Changes its process name
-
Executes dropped EXE
-
Modifies hosts file
Adds to hosts file used for mapping hosts to IP addresses.
-
Attempts to change immutable files
Modifies inode attributes on the filesystem to allow changing of immutable files.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads CPU attributes
-
Write file to user bin folder
-