Analysis

  • max time kernel
    26s
  • max time network
    129s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231221-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231221-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    15-01-2024 13:47

General

  • Target

    5d3dfce405d76a0c44fb0f29bd7e1493

  • Size

    40KB

  • MD5

    5d3dfce405d76a0c44fb0f29bd7e1493

  • SHA1

    c887cd41aa9edbcad42b2742e7d3538c8522eb51

  • SHA256

    f27c83f2e0996fe106ecd95d6a6ddcc944ec218e380e7a5479f2c567b4570787

  • SHA512

    83a94f4a8259e309180cab144a9f83d445e29e65c42238241ec6b0fe4731cc25f43b7556294b8c5c4911e00a54e39e918c8ee1ea36ddb14d5928db6569c19a59

  • SSDEEP

    768:9CRVNiLrfrNtiiy4ZKw/XwXAp299ugqDiSkDKDICvN5SmxNAWUrFD9:wkL9AirUw/+A49uLi98vSmxWJ9

Score
10/10

Malware Config

Signatures

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Detects Kaiten/Tsunami payload 1 IoCs
  • Kaiten/Tsunami

    Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/5d3dfce405d76a0c44fb0f29bd7e1493
    /tmp/5d3dfce405d76a0c44fb0f29bd7e1493
    1⤵
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1563

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1563-1-0x00007f9702052000-0x00007f9702066700-memory.dmp