Analysis
-
max time kernel
109s -
max time network
121s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20250307-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20250307-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
28/03/2025, 13:20
General
-
Target
x86
-
Size
53KB
-
MD5
dfc4c238a7eb7e331dd5ed7683a46847
-
SHA1
29c501a417a6e0564ab15091e008f1e4b36ff8a1
-
SHA256
d53180077d30cbcbec53397db73ab647784a537ab84164557c4abc7befd6dfb1
-
SHA512
ca2328c68a44686b1b4e32555cc448d193116819cb6cb806078fd795a9301e2cea7f50ef6c6cfa8b9673a20c4b952c766810325ecb7ba9f63ce102dc00c67f00
-
SSDEEP
1536:gAmkKnnAvjccy7ZeDm4ECd+67ZdC2BjWxr2dJKQDf2:nRKnAvjcV7ZIECdxZdC2tirS3b
Malware Config
Signatures
-
Contacts a large (94518) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
pid Process 2503 x86 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/smukrhxzdlnh% x86