Analysis
-
max time kernel
152s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231222-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231222-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
25/12/2023, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
1da60c4f5a6e96f7b37de6bdd0c6a213
Resource
ubuntu1804-amd64-20231222-en
General
-
Target
1da60c4f5a6e96f7b37de6bdd0c6a213
-
Size
55KB
-
MD5
1da60c4f5a6e96f7b37de6bdd0c6a213
-
SHA1
a2c1b47a7c7f520d2346ea6f57ca0315966a38a7
-
SHA256
dc554e3a67232a40a06eb96f0323903bfa4f7350b74123c6f93e5df889345344
-
SHA512
629a302dc00e1a4132b1a02fb31181a477b15bbdf06e0303656668c7ce8102e9eb1a9f7a908013e92b81f83a1e1761f299fd243eb1d6936a3b200b53a6dbfd5b
-
SSDEEP
1536:49S/9t6RLtBkFmm9gQ+MepCnELb/4HPDvy8mkySZs3:FWkFpkEnk/O7alks
Malware Config
Signatures
-
Contacts a large (60368) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 1578 1da60c4f5a6e96f7b37de6bdd0c6a213 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/332/cmdline File opened for reading /proc/527/cmdline File opened for reading /proc/591/exe File opened for reading /proc/1087/stat File opened for reading /proc/1145/stat File opened for reading /proc/426/maps File opened for reading /proc/469/exe File opened for reading /proc/694/exe File opened for reading /proc/1080/exe File opened for reading /proc/1125/exe File opened for reading /proc/697/stat File opened for reading /proc/779/cmdline File opened for reading /proc/1145/exe File opened for reading /proc/1197/cmdline File opened for reading /proc/1243/exe File opened for reading /proc/1266/maps File opened for reading /proc/493/exe File opened for reading /proc/794/cmdline File opened for reading /proc/1000/cmdline File opened for reading /proc/1031/maps File opened for reading /proc/1087/maps File opened for reading /proc/1191/maps File opened for reading /proc/1191/stat File opened for reading /proc/591/stat File opened for reading /proc/794/maps File opened for reading /proc/1125/cmdline File opened for reading /proc/1126/stat File opened for reading /proc/1192/maps File opened for reading /proc/1248/exe File opened for reading /proc/483/stat File opened for reading /proc/585/cmdline File opened for reading /proc/812/cmdline File opened for reading /proc/1071/stat File opened for reading /proc/1141/cmdline File opened for reading /proc/1154/stat File opened for reading /proc/1300/maps File opened for reading /proc/721/cmdline File opened for reading /proc/1243/maps File opened for reading /proc/245/maps File opened for reading /proc/1098/maps File opened for reading /proc/1161/cmdline File opened for reading /proc/445/cmdline File opened for reading /proc/483/maps File opened for reading /proc/1036/cmdline File opened for reading /proc/1050/stat File opened for reading /proc/1198/exe File opened for reading /proc/450/cmdline File opened for reading /proc/1000/maps File opened for reading /proc/1225/exe File opened for reading /proc/320/cmdline File opened for reading /proc/426/exe File opened for reading /proc/469/maps File opened for reading /proc/609/stat File opened for reading /proc/1155/exe File opened for reading /proc/1158/cmdline File opened for reading /proc/1198/stat File opened for reading /proc/483/cmdline File opened for reading /proc/713/cmdline File opened for reading /proc/794/stat File opened for reading /proc/1125/maps File opened for reading /proc/1248/stat File opened for reading /proc/1150/cmdline File opened for reading /proc/491/maps File opened for reading /proc/516/maps -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/1da60c4f5a6e96f7b37de6bdd0c6a213 1da60c4f5a6e96f7b37de6bdd0c6a213