Analysis
-
max time kernel
152s -
max time network
154s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221111-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221111-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
15-05-2023 01:31
General
-
Target
9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf
-
Size
30KB
-
MD5
84a88b40d9e2fe36e6a73b93898dddc2
-
SHA1
3236d5a9361d89f1355259ccb27a5c575aff7492
-
SHA256
9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9
-
SHA512
aa77ee885c4063e734e79538d74b03fb1e78d3cc8b4c6d52da12c77ec78f8e7c97e431d5701880e8ce0a33e99a5c719e11d4af811e1ec7840c9cec71e992661b
-
SSDEEP
384:M7j+HABXrVZpAqNCADhauGewNXmQ55BryYxN4TkTJBkeksweuotb+ZHpZwDnHqmk:hHKXrVZpAqXzGe4H5eCueFOZJZIHqmQT
Malware Config
Signatures
-
Contacts a large (73551) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
Processes:
9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/watchdog 586 9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 3 IoCs
Reads data from /proc virtual filesystem.
Processes:
mkdirmvdescription ioc process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/593/exe -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/bin/watchdog����1!����� sh
Processes
-
/tmp/9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf/tmp/9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf1⤵
- Changes its process name
-
shsh -c "rm -rf bin/watchdog && mkdir bin; >bin/watchdog����1!����� && mv /tmp/9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf bin/watchdog�; chmod 777 bin/watchdog"2⤵
- Writes file to tmp directory
-
rmrm -rf bin/watchdog3⤵
-
mkdirmkdir bin3⤵
- Reads runtime system information
-
mvmv "/tmp/9ee35bb8aa6a7e7178ea47530bcb11f77669111b77953b96881e10c94a8b9ee9.elf" "bin/watchdog�"3⤵
- Reads runtime system information
-
chmodchmod 777 bin/watchdog3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/586-1-0x0000000008048000-0x00000000080588a8-memory.dmp