Analysis
-
max time kernel
152s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221111-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221111-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
31-05-2023 09:35
General
-
Target
db0fa4b8db0333367e9bda3ab68b8042.x86.elf
-
Size
32KB
-
MD5
61f55cf67c82b9d3fe28b747f327f22a
-
SHA1
677d68175090638c32075b5d2776c7db493d4816
-
SHA256
ad3be43a4feb37bf709b20aad0d2ee4df99f273e5f6086383be9fe0d5e7028b6
-
SHA512
dea5b6392475c0b69da2adfbd60e7193d440bf87763c9649d2163786474a6d8fb56d45517e255982af9309944a093b4fb9963dcee9188e52ca7347e3502ea8d2
-
SSDEEP
768:7Plc0REzRgcK+UqwoyspZy7TyNBYkXM2qbp5U5fnbcuyD7UiyqV:CdRgci8yiNz6g5fnouy8ZqV
Malware Config
Extracted
Family
mirai
Botnet
UNSTABLE
Signatures
-
Contacts a large (203796) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
Processes:
db0fa4b8db0333367e9bda3ab68b8042.x86.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself a 589 db0fa4b8db0333367e9bda3ab68b8042.x86.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 20 IoCs
Reads data from /proc virtual filesystem.
Processes:
db0fa4b8db0333367e9bda3ab68b8042.x86.elfdescription ioc File opened for reading /proc/595/cmdline File opened for reading /proc/607/cmdline File opened for reading /proc/613/cmdline File opened for reading /proc/644/cmdline File opened for reading /proc/406/cmdline File opened for reading /proc/587/cmdline File opened for reading /proc/592/cmdline File opened for reading /proc/593/cmdline File opened for reading /proc/412/cmdline File opened for reading /proc/594/cmdline File opened for reading /proc/self/exe db0fa4b8db0333367e9bda3ab68b8042.x86.elf File opened for reading /proc/566/cmdline File opened for reading /proc/585/cmdline File opened for reading /proc/586/cmdline File opened for reading /proc/617/cmdline File opened for reading /proc/635/cmdline File opened for reading /proc/413/cmdline File opened for reading /proc/429/cmdline File opened for reading /proc/430/cmdline File opened for reading /proc/584/cmdline