Analysis
-
max time kernel
27s -
max time network
134s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
22-12-2023 13:57
General
-
Target
b2e9b41444fdde126e9c0270afe318a5
-
Size
141KB
-
MD5
b2e9b41444fdde126e9c0270afe318a5
-
SHA1
f2e2fced18a4da66648a6e28e09a2fa4169fd262
-
SHA256
b2e6e6c25ee3a750645579538cdd3d9b953af4248c9b356b23345bb1078dd6f5
-
SHA512
a9f7933e62989109468427eed5c45bd7708e7546ef49c4edf5d8392cef617c892c496adec5119e9d96c74ce99cb257a90c5dde060126c1b5ac89c03cc4b4be28
-
SSDEEP
3072:L9AiIwTeuLi9TLJ2eymb9Nsb4nWpBqjvxThmKmgPmLJ5:L9Ah9Tgeymb9qb4nWHuw
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/1539-1-0x00007fb64937a000-0x00007fb64938e700-memory.dmp family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule behavioral1/memory/1539-1-0x00007fb64937a000-0x00007fb64938e700-memory.dmp family_kaiten -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe b2e9b41444fdde126e9c0270afe318a5 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.python b2e9b41444fdde126e9c0270afe318a5