Analysis
-
max time kernel
1s -
max time network
131s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
16-09-2024 13:50
Behavioral task
behavioral1
Sample
04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral2
Sample
04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral5
Sample
3782e0dedbfe37028a0848f9cce0647083dade4969e3ca2edde847536c76652d.elf
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral6
Sample
4b76ad80e9ce4c503bde0e476a88447426fc38315d440d22926627295e1b0ec6.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
4b76ad80e9ce4c503bde0e476a88447426fc38315d440d22926627295e1b0ec6.exe
Resource
win10v2004-20240802-en
General
-
Target
04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown
-
Size
371KB
-
MD5
2b9c8949f8a38de75f7c692d7d768591
-
SHA1
328d235e38f05b97eadfba5b3aa27826cbb4af66
-
SHA256
04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf
-
SHA512
e7bdbe98af08501b35ecedaceb2707d4079e5cae62d00161d67328f82e51fa34b3dc94c274596acaad021c1f2db572d991951e63260e294d403c04a8d74f7c34
-
SSDEEP
6144:pyZjxSZjEVdlcV5r2rjJUfJakVtj+Lp7R+0KoaGB068E4Xn6LFnnP1Iw2Q8TDpBX:pq9lcV5inJ0EkLjCpV+0KoaGBp/4Xn6S
Malware Config
Signatures
-
Processes:
python2description ioc process File opened for reading /proc/self/status python2 File opened for reading /proc/mounts python2 -
Writes file to tmp directory 2 IoCs
Malware often drops required files in the /tmp directory.
Processes:
python2description ioc process File opened for modification /tmp/04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown python2 File opened for modification /tmp/.. /.logbackups python2
Processes
-
/tmp/04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown/tmp/04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown1⤵PID:1508
-
/usr/local/sbin/python2python2 /tmp/04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown1⤵PID:1508
-
/usr/local/bin/python2python2 /tmp/04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown1⤵PID:1508
-
/usr/sbin/python2python2 /tmp/04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown1⤵PID:1508
-
/usr/bin/python2python2 /tmp/04d136f4c2bac4196b1795bcd9e625029d686c696e7decabd17970da22a35caf.unknown1⤵
- Reads runtime system information
- Writes file to tmp directory
PID:1508 -
/sbin/ldconfig/sbin/ldconfig -p2⤵PID:1512
-
-
/sbin/ldconfig.real/sbin/ldconfig.real -p2⤵PID:1512
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD583f2550373f2f19492aa30fbd5b57512
SHA1db8dc2b7a3bb754178d96fe9b4e434d0c017825b
SHA256c8f5600f3eb7d801a067e02c477719d37f560491c4dca56eacc11ca755eb1ac6
SHA5125ba77e79b4b068b0cfaf1297e1da85a800f6e28e0009f2fee7fdcf08235b18652f034186bb3c006981826ccdefcc5bff85871dcd1236f519b16f5d6bb68332dc