Analysis
-
max time kernel
152s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20230831-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20230831-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
07/10/2023, 05:44
Behavioral task
behavioral1
Sample
x86_64.elf
Resource
ubuntu1804-amd64-20230831-en
5 signatures
150 seconds
General
-
Target
x86_64.elf
-
Size
61KB
-
MD5
15c15fc923e9596814f02e63a01d67da
-
SHA1
3ca28b04e8d9291f7e9a8a014cda9817ff8f68bd
-
SHA256
b205219763ed4edae6fcf05d6e4b1bb6e480af8454d4a72520ef9a8b98a210d4
-
SHA512
d901b1da62235252f5fa1800078203c1a4a42241083ef5f3b1b66088da6a8d38801de798c7e2ceeb727aa7d8c54fa3492ed7261b7a52d66fbb7e4f6258a71de8
-
SSDEEP
1536:dpmbSQ6U3q7cCBT/lZsK/0DiQILiKimfFoktCe3fYRMK:WShU3q7cEDlCK/0DA9i8Fok06fYR1
Score
9/10
Malware Config
Signatures
-
Contacts a large (37362) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 614 x86_64.elf -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/�k�bin/systemd sh
Processes
-
/tmp/x86_64.elf/tmp/x86_64.elf1⤵
- Changes its process name
PID:614 -
/bin/shsh -c "rm -rf bin/systemd && mkdir bin; >�k�bin/systemd && mv /tmp/x86_64.elf bin/systemd; chmod 777 bin/systemd"2⤵
- Writes file to tmp directory
PID:615 -
/bin/rmrm -rf bin/systemd3⤵PID:616
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:617
-
-
/bin/chmodchmod 777 bin/systemd3⤵PID:618
-
-