General

  • Target

    al.txt

  • Size

    3KB

  • Sample

    240214-q8sghscd6y

  • MD5

    a84cc0a810b8772bfd33e660dd1f05da

  • SHA1

    155b9c06a1e3896f6336ea7a250078a015d269e5

  • SHA256

    d30538787f9b9b9c2bdb9a438e49b39e655642bc1ce21dac8a7b58f71d0f3f45

  • SHA512

    ecf516c1147ea307c2254c4b622bfc24984f011be42fe1a4c3356ae2bde51192af13f77f7238a2ba93233f4516a34478a893fdc035f901426540ba00ecb21421

Score
6/10

Malware Config

Targets

    • Target

      al.txt

    • Size

      3KB

    • MD5

      a84cc0a810b8772bfd33e660dd1f05da

    • SHA1

      155b9c06a1e3896f6336ea7a250078a015d269e5

    • SHA256

      d30538787f9b9b9c2bdb9a438e49b39e655642bc1ce21dac8a7b58f71d0f3f45

    • SHA512

      ecf516c1147ea307c2254c4b622bfc24984f011be42fe1a4c3356ae2bde51192af13f77f7238a2ba93233f4516a34478a893fdc035f901426540ba00ecb21421

    Score
    6/10
    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Reads CPU attributes

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.