Analysis

  • max time kernel
    155s
  • max time network
    157s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231215-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    31/12/2023, 00:42

General

  • Target

    22156fcea967b8462b9d1710bdfd42e7

  • Size

    39KB

  • MD5

    22156fcea967b8462b9d1710bdfd42e7

  • SHA1

    ecd7369f9fd9e5ae7de61880fd7556bec327c99c

  • SHA256

    9d922c06c6ea17ad489d1dfe38a643da08ae122af82b32caab38af27545f95d8

  • SHA512

    a33f7e73da17ce318ea85f696d290c684bb944b87d0f70ac0c9da24faff46f9790936975c5bb2690f69c8b9c1de17c8f58e83313113807d94ef8e76876cd3ca1

  • SSDEEP

    768:QVoRjH8C40eAXx+GN7GEMfw7YdNRkoM28t:Eo5H8C40LB+GoESyYdNig8

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Deletes itself 1 IoCs
  • Unexpected DNS network traffic destination 14 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/22156fcea967b8462b9d1710bdfd42e7
    /tmp/22156fcea967b8462b9d1710bdfd42e7
    1⤵
    • Changes its process name
    • Deletes itself
    • Writes file to tmp directory
    PID:1593

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads