Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231222-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231222-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    25/12/2023, 00:41

General

  • Target

    1da60c4f5a6e96f7b37de6bdd0c6a213

  • Size

    55KB

  • MD5

    1da60c4f5a6e96f7b37de6bdd0c6a213

  • SHA1

    a2c1b47a7c7f520d2346ea6f57ca0315966a38a7

  • SHA256

    dc554e3a67232a40a06eb96f0323903bfa4f7350b74123c6f93e5df889345344

  • SHA512

    629a302dc00e1a4132b1a02fb31181a477b15bbdf06e0303656668c7ce8102e9eb1a9f7a908013e92b81f83a1e1761f299fd243eb1d6936a3b200b53a6dbfd5b

  • SSDEEP

    1536:49S/9t6RLtBkFmm9gQ+MepCnELb/4HPDvy8mkySZs3:FWkFpkEnk/O7alks

Score
9/10

Malware Config

Signatures

  • Contacts a large (60368) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/1da60c4f5a6e96f7b37de6bdd0c6a213
    /tmp/1da60c4f5a6e96f7b37de6bdd0c6a213
    1⤵
    • Changes its process name
    • Writes file to tmp directory
    PID:1578

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads