Analysis
-
max time kernel
154s -
max time network
155s -
platform
linux_amd64 -
resource
ubuntu1804-amd64-en-20211208 -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
18-07-2023 16:51
General
-
Target
db0fa4b8db0333367e9bda3ab68b8042.x86
-
Size
32KB
-
MD5
c375339e398fd39a5203e791e5c37f67
-
SHA1
6afd9fbc01eccd4dfcd972604e4e2cc0119b8243
-
SHA256
c1e5375ed9fadc54370de6cf7758de7323409f29a198287f5a1e4a15cd07ac00
-
SHA512
50a32af8b09fc45bb62c21298d527004350a8746843bce25e04174cf3a4da89a5e0142cb68c2277696b24558dc15e833ed836dd217f574b4a8652242b9da92e9
-
SSDEEP
768:uNyFa59wp6bs++1xqjENnqgVDTDcFCA+0yF65rVifnbcuyD7Uiyqu:ug05qMbsX4qnz1t0Ifnouy8Zqu
Malware Config
Extracted
mirai
UNSTABLE
testbots.maizhangyu.top
Signatures
-
Contacts a large (180873) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
Processes:
db0fa4b8db0333367e9bda3ab68b8042.x86description ioc pid process Changes the process name, possibly in an attempt to hide itself a 575 db0fa4b8db0333367e9bda3ab68b8042.x86 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 11 IoCs
Reads data from /proc virtual filesystem.
Processes:
db0fa4b8db0333367e9bda3ab68b8042.x86description ioc File opened for reading /proc/541/cmdline File opened for reading /proc/570/cmdline File opened for reading /proc/571/cmdline File opened for reading /proc/578/cmdline File opened for reading /proc/579/cmdline File opened for reading /proc/580/cmdline File opened for reading /proc/self/exe db0fa4b8db0333367e9bda3ab68b8042.x86 File opened for reading /proc/572/cmdline File opened for reading /proc/573/cmdline File opened for reading /proc/581/cmdline File opened for reading /proc/422/cmdline