Analysis
-
max time kernel
148s -
max time network
136s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231221-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231221-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
26-01-2024 06:49
Behavioral task
behavioral1
Sample
76ac55481e86a67887fa840f461f867f
Resource
ubuntu1804-amd64-20231221-en
ubuntu-18.04-amd64
4 signatures
150 seconds
General
-
Target
76ac55481e86a67887fa840f461f867f
-
Size
101KB
-
MD5
76ac55481e86a67887fa840f461f867f
-
SHA1
5aeec9dfb5928ce4faef2f392a2a8c666b67b9a7
-
SHA256
6c55ce26bac4ab2c46571ef036b55d414bf1fbb29f350dbe560dde3c6db96cc4
-
SHA512
ca6de6067a3063efc9d8f1bb6d51521f13d6132b12b225005e639094549a6b63a5ff10836e7ce19b04c887b8b703a81ce3e2bac50ea57ef5c82cc13ce7aeebb3
-
SSDEEP
3072:wW8FUmgujld6Mkxm6AJ+4fQSHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fQSHmmFVcqq0GnDZT
Score
7/10
Malware Config
Signatures
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 1593 76ac55481e86a67887fa840f461f867f -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 76ac55481e86a67887fa840f461f867f -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 76ac55481e86a67887fa840f461f867f