Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    ubuntu-20.04_amd64
  • resource
    ubuntu2004-amd64-20240221-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system
  • submitted
    22-02-2024 06:16

General

  • Target

    d1e6e268a5755d36955ebd5674ff9c0e7d0bc2d6745a84fd6106863c870e4f07.elf

  • Size

    48KB

  • MD5

    49017f843a832a3039c2910dd51b0532

  • SHA1

    926c88bc8e8ef19d560ded79db8f309b86e966b2

  • SHA256

    d1e6e268a5755d36955ebd5674ff9c0e7d0bc2d6745a84fd6106863c870e4f07

  • SHA512

    d16105af4a9909e4b959538fd43fe66f2aaf880ebbc41ef64f6c5820ac11a3298824707f8c68f9d9b47227b0b0173ba074bd25d1443676fe206b3e2545874115

  • SSDEEP

    1536:6nJRT4QPfZfW5XTOeY3Dve3AG+1pa/4Qw7bn2ise:Gv4QPfZfW5XTOeoEzG0AQwf2i

Score
7/10

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d1e6e268a5755d36955ebd5674ff9c0e7d0bc2d6745a84fd6106863c870e4f07.elf
    /tmp/d1e6e268a5755d36955ebd5674ff9c0e7d0bc2d6745a84fd6106863c870e4f07.elf
    1⤵
      PID:1479

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Hijack Execution Flow

    1
    T1574

    Privilege Escalation

    Hijack Execution Flow

    1
    T1574

    Defense Evasion

    Impair Defenses

    1
    T1562

    Hijack Execution Flow

    1
    T1574

    Replay Monitor

    Loading Replay Monitor...

    Downloads