Analysis

  • max time kernel
    14156s
  • max time network
    154s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • submitted
    21-05-2022 12:58

General

  • Target

    040d51bab5adcad9857b663ce666b0b113e4db2e32ebfe95fb3601b1a6def8b7

  • Size

    33KB

  • MD5

    4ad284ea99b6de1e4110076ef5b887a9

  • SHA1

    30e55fb2ce8255ba328af91019a612940f738fd1

  • SHA256

    040d51bab5adcad9857b663ce666b0b113e4db2e32ebfe95fb3601b1a6def8b7

  • SHA512

    c545e403fb6d3a0c463cf7e6e0f54d68203d3ea791a88b5f6be86673129ca4307d6ebcad4f868a61feee43b3fd5ebd8088b522f14e2adf9928a86549336ac9e2

Score
9/10

Malware Config

Signatures

  • Contacts a large (23510) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 1 IoCs

Processes

  • ./040d51bab5adcad9857b663ce666b0b113e4db2e32ebfe95fb3601b1a6def8b7
    ./040d51bab5adcad9857b663ce666b0b113e4db2e32ebfe95fb3601b1a6def8b7
    1⤵
    • Writes file to system bin folder
    PID:571

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

Replay Monitor

Loading Replay Monitor...

Downloads