Analysis
-
max time kernel
26s -
max time network
129s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231221-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231221-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
15-01-2024 13:47
General
-
Target
5d3dfce405d76a0c44fb0f29bd7e1493
-
Size
40KB
-
MD5
5d3dfce405d76a0c44fb0f29bd7e1493
-
SHA1
c887cd41aa9edbcad42b2742e7d3538c8522eb51
-
SHA256
f27c83f2e0996fe106ecd95d6a6ddcc944ec218e380e7a5479f2c567b4570787
-
SHA512
83a94f4a8259e309180cab144a9f83d445e29e65c42238241ec6b0fe4731cc25f43b7556294b8c5c4911e00a54e39e918c8ee1ea36ddb14d5928db6569c19a59
-
SSDEEP
768:9CRVNiLrfrNtiiy4ZKw/XwXAp299ugqDiSkDKDICvN5SmxNAWUrFD9:wkL9AirUw/+A49uLi98vSmxWJ9
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/1563-1-0x00007f9702052000-0x00007f9702066700-memory.dmp family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule behavioral1/memory/1563-1-0x00007f9702052000-0x00007f9702066700-memory.dmp family_kaiten -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe 5d3dfce405d76a0c44fb0f29bd7e1493 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.python 5d3dfce405d76a0c44fb0f29bd7e1493