HIGH Staged Malware Activity - 2123359011
Detected (Reported)
ID: #6352
|
Detected: 2026-01-05 09:30:01
|
Malware
Alert Overview
Process executes an obfuscated command for fetching remote files
Unclassified
XDR Agent
New
DS:PANW/XDR Agent
DOM:Security
Host Information
Process Information
Process Execution
Actor Process (Executor)
| Process Name | cron |
|---|---|
| Path | /usr/sbin/cron |
| PID | 85312 |
| SHA256 |
6bd8593640af2413bce259fa0affc18dbf149892756ebe805bf316624f8b590f
VT
|
| MD5 | 3159d21dc0325f937ad307b8e8cba959 |
/usr/sbin/cron -f -P
Parent Process (Causality)
| Process Name | cron |
|---|---|
| Path | /usr/sbin/cron |
| SHA256 |
6bd8593640af2413bce259fa0affc18dbf149892756ebe805bf316624f8b590f
VT
|
/usr/sbin/cron -f -P
MITRE ATT&CK Mapping
Severity Analysis
HIGH
High priority investigation needed
Summary
Events
1
IP Addresses
1
Tags
2
File Artifacts
Yes
Network Artifacts
No
Registry Artifacts
No
Analyst Verdict