Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20221111-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20221111-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    15-05-2023 01:31

General

  • Target

    9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf

  • Size

    30KB

  • MD5

    84a88b40d9e2fe36e6a73b93898dddc2

  • SHA1

    3236d5a9361d89f1355259ccb27a5c575aff7492

  • SHA256

    9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9

  • SHA512

    aa77ee885c4063e734e79538d74b03fb1e78d3cc8b4c6d52da12c77ec78f8e7c97e431d5701880e8ce0a33e99a5c719e11d4af811e1ec7840c9cec71e992661b

  • SSDEEP

    384:M7j+HABXrVZpAqNCADhauGewNXmQ55BryYxN4TkTJBkeksweuotb+ZHpZwDnHqmk:hHKXrVZpAqXzGe4H5eCueFOZJZIHqmQT

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (73551) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 3 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf
    /tmp/9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf
    1⤵
    • Changes its process name
    PID:586
    • sh
      sh -c "rm -rf bin/watchdog && mkdir bin; >bin/watchdog����1!����� && mv /tmp/9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf bin/watchdog�; chmod 777 bin/watchdog"
      2⤵
      • Writes file to tmp directory
      PID:587
      • rm
        rm -rf bin/watchdog
        3⤵
          PID:588
        • mkdir
          mkdir bin
          3⤵
          • Reads runtime system information
          PID:589
        • mv
          mv "/tmp/9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf" "bin/watchdog�"
          3⤵
          • Reads runtime system information
          PID:590
        • chmod
          chmod 777 bin/watchdog
          3⤵
            PID:591

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Network Service Scanning

      2
      T1046

      System Network Connections Discovery

      1
      T1049

      System Network Configuration Discovery

      1
      T1016

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/586-1-0x0000000008048000-0x00000000080588a8-memory.dmp