Resubmissions

23-02-2024 03:45

240223-ea6qpsaf9t 10

23-02-2024 02:03

240223-cg4htahg5x 10

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240221-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240221-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    23-02-2024 02:03

General

  • Target

    016005310b52d074fae59ca6682bd047ffe909f2849122ea0181c26ad2da41cb.elf

  • Size

    72KB

  • MD5

    ff2986c0ae9f76f395a03eb041d3f736

  • SHA1

    cd72af507c7d47b5765d94028e8b1284010f4a24

  • SHA256

    016005310b52d074fae59ca6682bd047ffe909f2849122ea0181c26ad2da41cb

  • SHA512

    e4bbcc096bc3eccc094f700937844fd0f0d29054368b41c9041841ef7c6255e72b1c5be5c3d67668cdfd965babc2ac56a9cb1e33d0eb9afb2a16bd99dda6fefc

  • SSDEEP

    1536:XNQb3EPdjmfX41gPEe/yWhxwZcJebovZ9AsUmJ:X+EVKfXlp/ynZOebmZ9AsJ

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/016005310b52d074fae59ca6682bd047ffe909f2849122ea0181c26ad2da41cb.elf
    /tmp/016005310b52d074fae59ca6682bd047ffe909f2849122ea0181c26ad2da41cb.elf
    1⤵
    • Changes its process name
    PID:1550

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Replay Monitor

Loading Replay Monitor...

Downloads