General

  • Target

    tcp.sh

  • Size

    79KB

  • Sample

    240418-1m7pesgg5y

  • MD5

    9e27454af5da6e20904155921281b051

  • SHA1

    bef897b5401cd426bd212c7700498a0fb54dd674

  • SHA256

    db03c6d42bf4bf5deb0b8276ea3117a2e5352c76350f76d2969dafe5771727f9

  • SHA512

    6c1e0376394d6115b34d3803f08c40116c76a58af81c82722d9f52e6f52f9a3a995db72ef0e6578105ad8742c07edc2dca77532243c2e2685c264bcad183e2dc

  • SSDEEP

    768:eXa2fuBaGcnfyVyL/nC7FsGeQu+yeE+u12F2+n6ncaChUv0IWmjWCEppUAYfhI7:wah7wT+KGeQu+ymhUv0IWWWCEppUXfC7

Score
6/10

Malware Config

Targets

    • Target

      tcp.sh

    • Size

      79KB

    • MD5

      9e27454af5da6e20904155921281b051

    • SHA1

      bef897b5401cd426bd212c7700498a0fb54dd674

    • SHA256

      db03c6d42bf4bf5deb0b8276ea3117a2e5352c76350f76d2969dafe5771727f9

    • SHA512

      6c1e0376394d6115b34d3803f08c40116c76a58af81c82722d9f52e6f52f9a3a995db72ef0e6578105ad8742c07edc2dca77532243c2e2685c264bcad183e2dc

    • SSDEEP

      768:eXa2fuBaGcnfyVyL/nC7FsGeQu+yeE+u12F2+n6ncaChUv0IWmjWCEppUAYfhI7:wah7wT+KGeQu+ymhUv0IWWWCEppUXfC7

    Score
    6/10
    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Checks hardware identifiers (DMI)

      Checks DMI information which indicate if the system is a virtual machine.

    • Legitimate hosting services abused for malware hosting/C2

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks