Analysis
-
max time kernel
152s -
max time network
155s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231222-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231222-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
18-02-2024 17:42
Behavioral task
behavioral1
Sample
f8f15cecf2ae7ec15a917fc3c61dcf52.elf
Resource
ubuntu1804-amd64-20231222-en
General
-
Target
f8f15cecf2ae7ec15a917fc3c61dcf52.elf
-
Size
57KB
-
MD5
f8f15cecf2ae7ec15a917fc3c61dcf52
-
SHA1
8631eb01f1f44a20e6eb07e9a26df0dd2783b9f1
-
SHA256
38459bc1225073655613b88f211d187f92fc6b8225fbdf8f5c01579839002b9b
-
SHA512
ed8d18c03330421c8f67e7b54ec10cb4b5eff34466ed6a915a2d58459bdb5196f8210ebc21fcbb763bf4a074b0b0937b06a86eaa4b33a7c73d1a887f558c9a11
-
SSDEEP
1536:yP/2+OX+hs4pIq/sxSWk/zvwt33U3zo7:O/2+++BWxSWk/TQ33mE7
Malware Config
Signatures
-
Contacts a large (37130) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 1556 f8f15cecf2ae7ec15a917fc3c61dcf52.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 2 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp f8f15cecf2ae7ec15a917fc3c61dcf52.elf File opened for reading /proc/net/tcp Process not Found -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp f8f15cecf2ae7ec15a917fc3c61dcf52.elf File opened for reading /proc/net/tcp Process not Found -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/980/exe File opened for reading /proc/1628/exe File opened for reading /proc/1673/exe File opened for reading /proc/1125/fd File opened for reading /proc/1168/fd File opened for reading /proc/1234/fd File opened for reading /proc/855/exe File opened for reading /proc/723/exe File opened for reading /proc/1097/exe File opened for reading /proc/1101/exe File opened for reading /proc/1605/exe File opened for reading /proc/1068/fd File opened for reading /proc/1906/exe File opened for reading /proc/445/fd File opened for reading /proc/484/fd File opened for reading /proc/1553/exe File opened for reading /proc/1716/exe File opened for reading /proc/1802/exe File opened for reading /proc/270/fd File opened for reading /proc/1097/fd File opened for reading /proc/1148/fd File opened for reading /proc/1653/exe File opened for reading /proc/449/fd File opened for reading /proc/629/exe File opened for reading /proc/993/exe File opened for reading /proc/714/fd File opened for reading /proc/446/exe File opened for reading /proc/1705/exe File opened for reading /proc/1823/exe File opened for reading /proc/246/fd File opened for reading /proc/661/exe File opened for reading /proc/972/exe File opened for reading /proc/1669/exe File opened for reading /proc/643/fd File opened for reading /proc/1153/fd File opened for reading /proc/1278/fd File opened for reading /proc/452/exe File opened for reading /proc/881/exe File opened for reading /proc/1136/fd File opened for reading /proc/1034/exe File opened for reading /proc/1456/exe File opened for reading /proc/1866/exe File opened for reading /proc/1561/fd File opened for reading /proc/437/exe File opened for reading /proc/597/fd File opened for reading /proc/1072/fd File opened for reading /proc/488/exe File opened for reading /proc/1914/exe File opened for reading /proc/881/fd File opened for reading /proc/1159/fd File opened for reading /proc/1230/fd File opened for reading /proc/1433/fd File opened for reading /proc/1374/fd File opened for reading /proc/1134/exe File opened for reading /proc/1980/exe File opened for reading /proc/1676/exe File opened for reading /proc/1916/exe File opened for reading /proc/1093/exe File opened for reading /proc/1622/exe File opened for reading /proc/1965/exe File opened for reading /proc/1012/fd File opened for reading /proc/1291/fd File opened for reading /proc/422/exe File opened for reading /proc/1038/exe -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/f8f15cecf2ae7ec15a917fc3c61dcf52.elf f8f15cecf2ae7ec15a917fc3c61dcf52.elf