Analysis
-
max time kernel
208s -
max time network
209s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221125-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221125-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
08-05-2023 05:42
General
-
Target
lscpu
-
Size
18KB
-
MD5
238f500e74164a32a86646792d56accd
-
SHA1
fa2516c644d18ea74684c13d0f2140607acce7b8
-
SHA256
77e54b206b632f707f03acdce2cae28f539517e50ed9c24755258106ff61c61f
-
SHA512
e2c7596786ff73b6793b7dc94a112ab6c090b2f1874c1e2e6080793bd98208d76fc2010beeded541ed0c98d7f07d372fc8aeb4bf2ddf4850b0ef1e354f1a2d2d
-
SSDEEP
384:MveHKBGXaLKbt3PSgArJK2dRQQeCPKlFYiyGgQVyXxIgFs70ukuReQLq51R:lQGXiuK902dRECPWlcXTs7iR
Malware Config
Signatures
-
Modifies the Watchdog daemon 1 TTPs
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Changes its process name 1 IoCs
Processes:
lscpudescription pid process Changes the process name, possibly in an attempt to hide itself 609 lscpu -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 37 IoCs
Reads data from /proc virtual filesystem.
Processes:
lscpudescription ioc File opened for reading /proc/431/exe File opened for reading /proc/447/fd File opened for reading /proc/610/exe File opened for reading /proc/361/fd File opened for reading /proc/367/fd File opened for reading /proc/612/fd File opened for reading /proc/613/exe File opened for reading /proc/615/exe File opened for reading /proc/346/fd File opened for reading /proc/610/fd File opened for reading /proc/604/exe File opened for reading /proc/253/fd File opened for reading /proc/355/fd File opened for reading /proc/291/fd File opened for reading /proc/384/fd File opened for reading /proc/391/fd File opened for reading /proc/613/fd File opened for reading /proc/447/exe File opened for reading /proc/607/exe File opened for reading /proc/614/exe File opened for reading /proc/627:pmp File opened for reading /proc/self/exe lscpu File opened for reading /proc/606/exe File opened for reading /proc/231/fd File opened for reading /proc/1/fd File opened for reading /proc/290/fd File opened for reading /proc/343/fd File opened for reading /proc/429/exe File opened for reading /proc/448/exe File opened for reading /proc/585/exe File opened for reading /proc/351/fd File opened for reading /proc/448/fd File opened for reading /proc/585/fd File opened for reading /proc/604/fd File opened for reading /proc/425/exe File opened for reading /proc/605/exe File opened for reading /proc/345/fd
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/609-1-0x0000000008048000-0x00000000080536e0-memory.dmp