Analysis

  • max time kernel
    120s
  • max time network
    68s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    25-03-2024 16:13

General

  • Target

    de6bd4cf60a0d8bf44d80345b7611123

  • Size

    4.5MB

  • MD5

    de6bd4cf60a0d8bf44d80345b7611123

  • SHA1

    e0d832ba70fedc48ab0b347c8b032ae0b798dd43

  • SHA256

    cc112184b17d65229ce20487d98a3751dceb3efbee7bf70929a35b66416ae248

  • SHA512

    a4a1b22104c82e9ebc0dc50d7aeed922a129f9c962a03d3ef3d6d7889183d24074e1acd18abdd2670a834976276bd9245793476319b1e18ac74c30539c7b2db3

  • SSDEEP

    49152:frO0RuO6QtIIySbKXYkbTPb+HGKuAb7/C:DO0QOJtzFeXNbq/C

Score
3/10

Malware Config

Signatures

  • Enumerates kernel/hardware configuration 1 TTPs 1 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/de6bd4cf60a0d8bf44d80345b7611123
    /tmp/de6bd4cf60a0d8bf44d80345b7611123
    1⤵
    • Enumerates kernel/hardware configuration
    • Writes file to tmp directory
    PID:651

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads