Analysis
-
max time kernel
2s -
max time network
4s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20250307-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20250307-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
08/03/2025, 11:01
General
-
Target
x86
-
Size
61KB
-
MD5
26d39d6b4b255fd000378d4dcdca2b8d
-
SHA1
404e9f0d7e6fef2822889a3fee663938403197f2
-
SHA256
37bd3d9af41b12e3ebc1e100cebb351f958b5f70b76484abd2a6b556252762fc
-
SHA512
466cd5515df5d5626f514860d8505f40adcac9ddf31c034af9ef0e1b022d8003c323cdaafcfd3732f50b2e11b78ad580aed15d363a877d3f7b7c0ef711417821
-
SSDEEP
1536:Z7qARubgzY/bEJykRcpH80LDHhklv4JQC9DSW:NP+eY/bEJGdXBk9AP9l
Malware Config
Signatures
-
Contacts a large (1177) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
pid Process 4131 x86 4135 x86 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/5ds71mcr x86