Analysis
-
max time kernel
153s -
max time network
154s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221111-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221111-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
03-06-2023 19:41
General
-
Target
sshkey2.elf
-
Size
18KB
-
MD5
49b55b5189424fa00c16d438cfcab0e1
-
SHA1
488e9f9035076250cea5e41119f41d63f25c474e
-
SHA256
caf577935671be92ac6d345a23f49168787250316edbe6ddccebdfbcdec385eb
-
SHA512
1e53a0a1a69faa2db102efba490020e9f3652b0f177ece69b0343522a1f082e5cd068ce16b3f8cd36e79745bdb20797420f73abefe8527d5be21a72a505a5ad0
-
SSDEEP
384:MWeHKBGXaLKbt3PSgArJK2dRQQeCPKlFYjKN399R5lBHcUexKXnUbeQLq51e:MQGXiuK902dRECPJeN9jlBHcUeA3Pe
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
Processes:
sshkey2.elfdescription pid process Changes the process name, possibly in an attempt to hide itself 594 sshkey2.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 37 IoCs
Reads data from /proc virtual filesystem.
Processes:
sshkey2.elfdescription ioc File opened for reading /proc/600/exe File opened for reading /proc/357/fd File opened for reading /proc/371/fd File opened for reading /proc/598/exe File opened for reading /proc/429/exe File opened for reading /proc/589/exe File opened for reading /proc/253/fd File opened for reading /proc/426/exe File opened for reading /proc/590/exe File opened for reading /proc/351/fd File opened for reading /proc/598/fd File opened for reading /proc/410/exe File opened for reading /proc/565/exe File opened for reading /proc/335/fd File opened for reading /proc/340/fd File opened for reading /proc/611:pmp File opened for reading /proc/self/exe sshkey2.elf File opened for reading /proc/427/exe File opened for reading /proc/591/exe File opened for reading /proc/345/fd File opened for reading /proc/347/fd File opened for reading /proc/565/fd File opened for reading /proc/227/fd File opened for reading /proc/320/fd File opened for reading /proc/589/fd File opened for reading /proc/592/exe File opened for reading /proc/1/fd File opened for reading /proc/427/fd File opened for reading /proc/597/fd File opened for reading /proc/595/exe File opened for reading /proc/409/exe File opened for reading /proc/599/exe File opened for reading /proc/318/fd File opened for reading /proc/334/fd File opened for reading /proc/365/fd File opened for reading /proc/426/fd File opened for reading /proc/595/fd