Analysis
-
max time kernel
143s -
max time network
149s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
03-07-2024 01:04
Behavioral task
behavioral1
Sample
0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf
-
Size
54KB
-
MD5
c8d03328fa2d2d10800b9b31b52c0b45
-
SHA1
cbcc393fcb8a6c355aebb6e727b849d0d2621ed7
-
SHA256
0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf
-
SHA512
c88c9625ed658f4ec2300058e9729f0304201ae54e360fbe0f3f2718d77d52974736d4bb3d618d31e35459c4d297f8d0518c7e29c96eae31a95a5c24f94963bd
-
SSDEEP
1536:36Ew7hWCbZ6OzptrGP85wXypWTF+bt+Rc:C1W4Z6OzP4NXypWp+bQK
Malware Config
Signatures
-
Contacts a large (11831) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
Processes:
0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elfpid process 1583 0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elfdescription ioc process File opened for modification /dev/watchdog 0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf File opened for modification /dev/misc/watchdog 0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elfdescription ioc process File opened for reading /proc/net/tcp 0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf -
Changes its process name 1 IoCs
Processes:
0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elfdescription pid process Changes the process name, possibly in an attempt to hide itself 1583 0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elfdescription ioc process File opened for reading /proc/net/tcp 0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf
Processes
-
/tmp/0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf/tmp/0d1c0c547ff6ad0d5e649eb3e7c0354136ee19841c6a7efba4d2a90597260bdf.elf1⤵
- Deletes itself
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration