Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240226-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    06/03/2024, 01:54

General

  • Target

    2a00fe6cc98e25b9049b9adddbdad5fe5e693521de46c9592fa234d93a5bb733.elf

  • Size

    113KB

  • MD5

    96907e07603b72cb03b5ca6eeaed7808

  • SHA1

    0ca80cadd52271c7caaa05ab8a8edc2792d3d1e9

  • SHA256

    2a00fe6cc98e25b9049b9adddbdad5fe5e693521de46c9592fa234d93a5bb733

  • SHA512

    b97cabca7c7d912c470e6f08a24857031a542d6268f0cf812c7fd907cd970840259a57330f1c742ed065beed1567d90737eeef59b58f2ea2a4986504dc5b55ca

  • SSDEEP

    3072:kiry859a2ADJf9wHYqbgFFo8+HeAz+TRCm7FnVqfJXFWbNb:T9a2aLqkrMSsm7FnVqfJXFWbNb

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/2a00fe6cc98e25b9049b9adddbdad5fe5e693521de46c9592fa234d93a5bb733.elf
    /tmp/2a00fe6cc98e25b9049b9adddbdad5fe5e693521de46c9592fa234d93a5bb733.elf
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:1507

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads