Analysis
-
max time kernel
2s -
max time network
129s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
17/02/2025, 05:52
General
-
Target
x86_64
-
Size
184KB
-
MD5
92dc30d449f563a5bdbba08d4a9d57fc
-
SHA1
ff609eed2df786396203a8806400566df079cc7f
-
SHA256
86db0330a233efe6e11f944833f9e9b7472d7f34595cf693f001d99df641513b
-
SHA512
573fa375ddcb6a49690f5168d791af2529a89233d3bf0ff50c2b88686c27e4cef59432e0f6ae71745fecfa2657c23248ad33ea50ac8b9f1c96721f38e3325097
-
SSDEEP
3072:JRuD2higiW5WdO4VgJYmntSxu23Ea8qxop/bW448wod7XSUdq7:JE6igifdlcYmtSb3d8qGjNHSQg
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/3637-1-0x0000785cbcada000-0x0000785cbcaee760-memory.dmp family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule behavioral1/memory/3637-1-0x0000785cbcada000-0x0000785cbcaee760-memory.dmp family_kaiten -
Kaiten family
-
description ioc Process File opened for reading /proc/self/exe x86_64 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.ssh x86_64