Analysis
-
max time kernel
132s -
max time network
148s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
21-05-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
gen_timelapse4.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
gen_timelapse4.sh
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
gen_timelapse4.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
gen_timelapse4.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
gen_timelapse4.sh
-
Size
186B
-
MD5
9e0d3dfd3df7f15d3d812cd80b6361a3
-
SHA1
6f905a81b9d5e7e2049e65d40f4c2b5b312712da
-
SHA256
1ffd8f4c4c6c685722318e0c052eb178fafc1e5bc5a4bf627d56f82901008bd6
-
SHA512
da5074262eae00dd8bbd3d3902ef5bf5f6936acd9eb5025f42356bce87432ed7f20afc0f2caea1de433569d550f72413002370d062f435543eaf8c13b253368d
Malware Config
Signatures
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/cam5_21-05-2024-07-03-14.jpg wget
Processes
-
/tmp/gen_timelapse4.sh/tmp/gen_timelapse4.sh1⤵PID:1504
-
/bin/datedate "+%d-%m-%Y-%H-%M-%S"2⤵PID:1505
-
-
/usr/bin/wgetwget "--output-document=cam5_21-05-2024-07-03-14.jpg" "http://admin:[email protected]:8105/ISAPI/Streaming/channels/1/picture"2⤵
- Writes file to tmp directory
PID:1506
-