Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20230831-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20230831-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    01/10/2023, 20:43

General

  • Target

    d4933d467e1da4f2f1599438776f98ed32a91ff88e19d90bd7ff4fe18d185005_JC.elf

  • Size

    66KB

  • MD5

    42060e4a7b0aca6bd8d200977b2f8bf9

  • SHA1

    5cf1c3414af79da593e4f087424be2146ac653b7

  • SHA256

    d4933d467e1da4f2f1599438776f98ed32a91ff88e19d90bd7ff4fe18d185005

  • SHA512

    302a6877dae54fd1a19b619fe157b33aafc314f4f6990bd7961b01b8ad7c5d72692689a4e434248aaa368416242062577d0fc74986378a77a281902d92d26478

  • SSDEEP

    1536:Tfu73WGGE0DUm8lquk5OTeGdkmM1bK148/yUVI:6Z10DU3lqVZCkmMBK14HUV

Score
9/10

Malware Config

Signatures

  • Contacts a large (23993) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads runtime system information 14 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d4933d467e1da4f2f1599438776f98ed32a91ff88e19d90bd7ff4fe18d185005_JC.elf
    /tmp/d4933d467e1da4f2f1599438776f98ed32a91ff88e19d90bd7ff4fe18d185005_JC.elf
    1⤵
    • Changes its process name
    PID:606

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads