MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Kinsing


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1
SHA3-384 hash: 09008059a978eafac3bde23e652336c97c881a588246467583c1c4ef5a1b026b65a712e9bc77856273a055196fa36899
SHA1 hash: bf2df8f2813ef4e2cf61ea193e091b808aa854c7
MD5 hash: 07b7746b922cf7d7fa821123a226ed36
humanhash: beryllium-jersey-sweet-angel
File name:1h.sh
Download: download sample
Signature Kinsing
File size:11'309 bytes
First seen:2021-12-10 21:39:49 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:Xws08k5tkd5DFPSV3n7/e867jNKvSbRXA8kWmk4lkCIkvUgoaES8DSWOlA+1esP:XQwL4/e867USbRXA8kWT4yCtvUgDjdWi
TLSH T12A32638EB010AD7425AEC4B49DE32DBD6037900A4C723F10E4546E78B69DA05A7B9FFD
Reporter Arkbird_SOLG
Tags:Kinsing log4j sh

Intelligence


File Origin
# of uploads :
1
# of downloads :
310
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
60%
Tags:
coinminer kinsing sustes
Result
Verdict:
UNKNOWN
Threat name:
Linux.Exploit.CVE-2020-7961
Status:
Malicious
First seen:
2021-12-10 20:32:17 UTC
File Type:
Text (Shell)
AV detection:
20 of 45 (44.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
linux persistence
Behaviour
Reads runtime system information
Reads CPU attributes
Creates/modifies Cron job
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Payload_F5_BIG_IP_Exploitations_Jul20_1
Author:Florian Roth
Description:Detects code found in report on exploits against CVE-2020-5902 F5 BIG-IP vulnerability by NCC group
Reference:https://research.nccgroup.com/2020/07/05/rift-f5-networks-k52145254-tmui-rce-vulnerability-cve-2020-5902-intelligence/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Kinsing

sh 063ccf736c2c19ca5db70b8d8a7cf00377899c16023c63fee836bdefadd336c1

(this sample)

  
Delivery method
Distributed via web download

Comments