Analysis
-
max time kernel
149s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20231215-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
21/02/2024, 03:09
Behavioral task
behavioral1
Sample
9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d.elf
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d.elf
-
Size
61KB
-
MD5
76fce295c4d9b3bd684de4610731273f
-
SHA1
46ad640e60b604dc4f513c6f0379a817d0cdea32
-
SHA256
9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d
-
SHA512
8040c9286739905fa407656d606cb53813d905288ad7e7a65aa8ecb5634dfaa320a70e41432d332d42f4422dfa6d7e736b3f87c7bd56da81e44b0f5611364e24
-
SSDEEP
1536:dpmbSQ6U3q7cCBT/lZsK/XYDiwE2NsimfFoktCe3fcxQj:WShU3q7cEDlCK/XYDsHi8Fok06fcxM
Malware Config
Signatures
-
Contacts a large (37877) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 1532 9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/155/cmdline File opened for reading /proc/430/cmdline File opened for reading /proc/474/cmdline File opened for reading /proc/609/cmdline File opened for reading /proc/1221/cmdline File opened for reading /proc/1299/cmdline File opened for reading /proc/159/cmdline File opened for reading /proc/171/cmdline File opened for reading /proc/1134/cmdline File opened for reading /proc/1138/cmdline File opened for reading /proc/1152/cmdline File opened for reading /proc/1177/cmdline File opened for reading /proc/1130/cmdline File opened for reading /proc/1189/cmdline File opened for reading /proc/1542/cmdline File opened for reading /proc/78/cmdline File opened for reading /proc/1017/cmdline File opened for reading /proc/1337/cmdline File opened for reading /proc/1527/cmdline File opened for reading /proc/447/cmdline File opened for reading /proc/925/cmdline File opened for reading /proc/939/cmdline File opened for reading /proc/1052/cmdline File opened for reading /proc/1172/cmdline File opened for reading /proc/1196/cmdline File opened for reading /proc/1360/cmdline File opened for reading /proc/1387/cmdline File opened for reading /proc/167/cmdline File opened for reading /proc/682/cmdline File opened for reading /proc/1156/cmdline File opened for reading /proc/1198/cmdline File opened for reading /proc/721/cmdline File opened for reading /proc/1088/cmdline File opened for reading /proc/1122/cmdline File opened for reading /proc/7/cmdline File opened for reading /proc/10/cmdline File opened for reading /proc/35/cmdline File opened for reading /proc/80/cmdline File opened for reading /proc/973/cmdline File opened for reading /proc/1298/cmdline File opened for reading /proc/24/cmdline File opened for reading /proc/448/cmdline File opened for reading /proc/1/cmdline File opened for reading /proc/25/cmdline File opened for reading /proc/84/cmdline File opened for reading /proc/157/cmdline File opened for reading /proc/1022/cmdline File opened for reading /proc/1530/cmdline File opened for reading /proc/4/cmdline File opened for reading /proc/89/cmdline File opened for reading /proc/479/cmdline File opened for reading /proc/1046/cmdline File opened for reading /proc/1071/cmdline File opened for reading /proc/21/cmdline File opened for reading /proc/28/cmdline File opened for reading /proc/162/cmdline File opened for reading /proc/318/cmdline File opened for reading /proc/30/cmdline File opened for reading /proc/85/cmdline File opened for reading /proc/165/cmdline File opened for reading /proc/532/cmdline File opened for reading /proc/1158/cmdline File opened for reading /proc/1529/cmdline File opened for reading /proc/79/cmdline -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/p4�bin/systemd sh
Processes
-
/tmp/9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d.elf/tmp/9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d.elf1⤵
- Changes its process name
PID:1532 -
/bin/shsh -c "rm -rf bin/systemd && mkdir bin; >p4�bin/systemd && mv /tmp/9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d.elf bin/systemd; chmod 777 bin/systemd"2⤵
- Writes file to tmp directory
PID:1533 -
/bin/rmrm -rf bin/systemd3⤵PID:1534
-
-
/bin/mkdirmkdir bin3⤵PID:1537
-
-
/bin/chmodchmod 777 bin/systemd3⤵PID:1538
-
-