Analysis
-
max time kernel
152s -
max time network
148s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20230621-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20230621-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
02/07/2023, 12:18
Behavioral task
behavioral1
Sample
0xh0roxxnavebusyoox86elf.elf
Resource
ubuntu1804-amd64-20230621-en
3 signatures
150 seconds
General
-
Target
0xh0roxxnavebusyoox86elf.elf
-
Size
56KB
-
MD5
6599aed7545666a669955a5dad4ac5d4
-
SHA1
c85f6bfbf6b126108ad544d99fca4c4acf939ed6
-
SHA256
ccf9d897245c4fc71a724850cb363851c179ec827f0ef9fa1881de34107969e6
-
SHA512
8248cd66a75214856ed705f1b590ef82d92279b20224a54e9a2f0f74bf1fb3d2f071607c7385e19c3985b9d806264260d247ad9100b8b9f544e7cf8d4c1ddef5
-
SSDEEP
1536:CVKFOD7prJkaNup1COy7O/HgeXDaLiwui7EPZP8x9:XFOXprOfPTy7yHgeXDaLru31Q
Score
7/10
Malware Config
Signatures
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 599 0xh0roxxnavebusyoox86elf.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Reads runtime system information 13 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/420/maps File opened for reading /proc/421/maps File opened for reading /proc/447/maps File opened for reading /proc/479/maps File opened for reading /proc/595/maps File opened for reading /proc/596/maps File opened for reading /proc/597/maps File opened for reading /proc/604/maps File opened for reading /proc/446/maps File opened for reading /proc/575/maps File opened for reading /proc/594/maps File opened for reading /proc/601/maps File opened for reading /proc/603/maps