Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231215-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    19/12/2023, 23:07

General

  • Target

    465802cbdb2c2c6a8ca2a8c78ef7fea4

  • Size

    126KB

  • MD5

    465802cbdb2c2c6a8ca2a8c78ef7fea4

  • SHA1

    2d507c452d45688232eaf43d761c6368821fe291

  • SHA256

    a3dd2867aa0682bca85fffdcc7ff98f2a3abb92f44de2615cb2c76b9fdf8ef4a

  • SHA512

    d156d095b86f3101b4ea909cd6c97420fb95d2c62aaff78acf3d92aa181a29065386fbc242a819c2983a39417e11a25a165d942cd6a11466e7d4a201170020d9

  • SSDEEP

    3072:o07KaBIKJ5sCRybR+ijPc3OxK//vmNKoVLWhxF25n:6Kob4GsnvmNKoVLWhxF25n

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/465802cbdb2c2c6a8ca2a8c78ef7fea4
    /tmp/465802cbdb2c2c6a8ca2a8c78ef7fea4
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:1538

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads