Analysis

  • max time kernel
    149s
  • max time network
    62s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240508-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    20-05-2024 23:11

General

  • Target

    freshwomen-season-2-episode-2-part-3-pc-720p-compressed/lib/py2-linux-x86_64/FreshWomen

  • Size

    14KB

  • MD5

    c232074c09dc05649abcbd9ed5554b5c

  • SHA1

    6557db1864012bd52038f7f59d6ee8d8958ab1d4

  • SHA256

    d934148d84b35fb456bf09a8c21e7a866c40cbf5d32a77f29e16235c9541d450

  • SHA512

    a3691c62359ab0756a1dfdfe1a4c233d31d0c72f2a8dd05c468ec8f21ff8e7694ddf4b312fec7c9b228f066229cbb484c0730d6c7b12ddba3b09b68dcb175bf9

  • SSDEEP

    96:Gn4CTXyfEsCvmoQ5032aIkeWiMREkqiV7bq9a:Gb7sEsCvm+3/fibkqi5

Score
4/10

Malware Config

Signatures

  • Changes its process name 2 IoCs
  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 1 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 29 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 64 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/freshwomen-season-2-episode-2-part-3-pc-720p-compressed/lib/py2-linux-x86_64/FreshWomen
    /tmp/freshwomen-season-2-episode-2-part-3-pc-720p-compressed/lib/py2-linux-x86_64/FreshWomen
    1⤵
    • Checks CPU configuration
    • Reads CPU attributes
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:1488
    • /usr/bin/dbus-launch
      dbus-launch --autolaunch 11c67417355f45d397f6be11f62e85a6 --binary-syntax --close-stderr
      2⤵
        PID:1489
      • /bin/sh
        sh -c "uname -p 2> /dev/null"
        2⤵
          PID:1497
          • /bin/uname
            uname -p
            3⤵
              PID:1498

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Virtualization/Sandbox Evasion

        1
        T1497

        Discovery

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /root/.renpy/FreshWomen-1593632962/text.txt
          Filesize

          5B

          MD5

          f4020e91252aafd4b18d8acd17f883db

          SHA1

          748d77dbb8bdb0dd330c099e7fde82da053fb1ff

          SHA256

          314ad142957febe390cc7223b4deb1d1b21c187f84f6e7257a23fe46c27fcae3

          SHA512

          301ddd0e34cbd842dae99a2cc4ccbfeb6ee8b3def39c214a719fa9edc26d7142749bbe6e992d26353dc167febbab0dbc05476b68a86ad93cab5f299f0aaf916d

        • /tmp/cWtUTi
          Filesize

          4B

          MD5

          3f1d1d8d87177d3d8d897d7e421f84d6

          SHA1

          dd082d742a5cb751290f1db2bd519c286aa86d95

          SHA256

          f02285fb90ed8c81531fe78cf4e2abb68a62be73ee7d317623e2c3e3aefdfff2

          SHA512

          2ae2b3936f31756332ca7a4b877d18f3fcc50e41e9472b5cd45a70bea82e29a0fa956ee6a9ee0e02f23d9db56b41d19cb51d88aac06e9c923a820a21023752a9