Analysis
-
max time kernel
154s -
max time network
151s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
08/07/2023, 18:00
Behavioral task
behavioral1
Sample
67ff291f081b7778e7bf9cf09.elf
Resource
ubuntu1804-amd64-en-20211208
3 signatures
150 seconds
General
-
Target
67ff291f081b7778e7bf9cf09.elf
-
Size
64KB
-
MD5
67ff291f081b7778e7bf9cf095679eba
-
SHA1
5056b397360007a886d6a56fad5119ffc87bab06
-
SHA256
5048566d8565ae9e700311dbba558f279107c320704e5a930deb914d0230101f
-
SHA512
6da3021f05005c6d958638bd0a6ca976b540f157653a93708f925203991e693f881f738bea9fe556c9525d7133ec2233977c29cb26332a13a0894005d882bad9
-
SSDEEP
1536:T562r5PIV8g4IVSFRhkiyzxyKu9+EYDlhW7EvOua:tvFzgLVSFDk5zxAIl0wvT
Score
7/10
Malware Config
Signatures
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 581 67ff291f081b7778e7bf9cf09.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Reads runtime system information 12 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/576/maps File opened for reading /proc/577/maps File opened for reading /proc/578/maps File opened for reading /proc/586/maps File opened for reading /proc/447/maps File opened for reading /proc/458/maps File opened for reading /proc/420/maps File opened for reading /proc/579/maps File opened for reading /proc/583/maps File opened for reading /proc/585/maps File opened for reading /proc/416/maps File opened for reading /proc/418/maps