Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231215-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    11/01/2024, 17:47

General

  • Target

    c0e125c31b9883cf738858419269387bfadbc533abcdbc4188787c5501d62335elf.elf

  • Size

    62KB

  • MD5

    5774b98696fdd0c2797a2e7ecfcf722e

  • SHA1

    ee6d7be216da462321bcfd7074acdb548937a02c

  • SHA256

    c0e125c31b9883cf738858419269387bfadbc533abcdbc4188787c5501d62335

  • SHA512

    b7aba6499c42a2d9ab5c05dea1f47b329b0730fc4096017c5c906ded6de2a0710431ab489771c3c25cfe82f750c2706dfd71b46fed65ece1d5c4f645e73589b1

  • SSDEEP

    1536:qyA6nhA0hy8ysIZ9TrNMEUHCQNufU4gVlE+HaxmxNtTonSCs:qy/hA0hy8gZ3ME0NUUNE+aWN6s

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/c0e125c31b9883cf738858419269387bfadbc533abcdbc4188787c5501d62335elf.elf
    /tmp/c0e125c31b9883cf738858419269387bfadbc533abcdbc4188787c5501d62335elf.elf
    1⤵
    • Changes its process name
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    PID:1543

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads