Analysis

  • max time kernel
    27s
  • max time network
    134s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231215-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    22-12-2023 13:57

General

  • Target

    b2e9b41444fdde126e9c0270afe318a5

  • Size

    141KB

  • MD5

    b2e9b41444fdde126e9c0270afe318a5

  • SHA1

    f2e2fced18a4da66648a6e28e09a2fa4169fd262

  • SHA256

    b2e6e6c25ee3a750645579538cdd3d9b953af4248c9b356b23345bb1078dd6f5

  • SHA512

    a9f7933e62989109468427eed5c45bd7708e7546ef49c4edf5d8392cef617c892c496adec5119e9d96c74ce99cb257a90c5dde060126c1b5ac89c03cc4b4be28

  • SSDEEP

    3072:L9AiIwTeuLi9TLJ2eymb9Nsb4nWpBqjvxThmKmgPmLJ5:L9Ah9Tgeymb9qb4nWHuw

Score
10/10

Malware Config

Signatures

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Detects Kaiten/Tsunami payload 1 IoCs
  • Kaiten/Tsunami

    Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/b2e9b41444fdde126e9c0270afe318a5
    /tmp/b2e9b41444fdde126e9c0270afe318a5
    1⤵
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1539

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1539-1-0x00007fb64937a000-0x00007fb64938e700-memory.dmp