Analysis
-
max time kernel
153s -
max time network
155s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
12/02/2024, 02:43
General
-
Target
8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43.elf
-
Size
36KB
-
MD5
184047f63f7a90e80013490538c9416c
-
SHA1
623474bf1cb4e40d6b4b18d8c1e9e4bc2014ffed
-
SHA256
8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43
-
SHA512
f522f9d9d455ffba51403d0bbe560a08af6f54afe7879fba58128d87712f9e2cab5aac55d3b646833ef3b1dc77bb788bfce9149e362bc70468f1afd22721f609
-
SSDEEP
768:N2+9wmSvVydtj6sq+BY+uBEyiHBFiQCeN4I/DbjkBSYr/scRrQHc1Nfv9sPqa:N2ewmSvVGZBrBY+u/mLXlOIb3iSYbRAh
Malware Config
Extracted
Family
mirai
Botnet
BOTNET
C2
194.169.175.3
Signatures
-
Contacts a large (76249) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /usr/bin/dbus-daemon 1523 8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43.elf -
Deletes itself 1 IoCs
pid Process 1523 8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43.elf -
Reads runtime system information 2 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe 8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43.elf File opened for reading /proc/1525/fd Process not Found