Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231215-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    19-12-2023 22:57

General

  • Target

    37c54bb52007ed226bc00132d44480b6

  • Size

    157KB

  • MD5

    37c54bb52007ed226bc00132d44480b6

  • SHA1

    c005d0fddf79930d68040bb91d6cf09f68160efa

  • SHA256

    d93a07c796c64276982ae6322582ffe8b6767e73d49795ac4c554e249776d0b6

  • SHA512

    37065a0fc547fa96f9d7bc6d6cad0b6ec036ec0f2c03064ff99439dffadfebc109b16ba1fa3b2e234ceb64011e44763fc6c39035a7aa7d6acd3cc7c322766ce3

  • SSDEEP

    3072:TVs3OWnGCF5YfuNsTNGXbU3E1pu1lZDcUD1kFBX5mDyd0xgrqmkfTX:JDCFHGTKbZPHUDG/YDyd0xgrqmkfTX

Score
9/10

Malware Config

Signatures

  • Contacts a large (201060) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/37c54bb52007ed226bc00132d44480b6
    /tmp/37c54bb52007ed226bc00132d44480b6
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:1543

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads