Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
14/03/2024, 02:26
Behavioral task
behavioral1
Sample
642211182634e9be9c048b693d757ef96f2ecd9af09b8a1365e7db9091abf28e.elf
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
642211182634e9be9c048b693d757ef96f2ecd9af09b8a1365e7db9091abf28e.elf
-
Size
61KB
-
MD5
1e53b21c6961e376506bcbf321315b58
-
SHA1
c4f0d98e42a4bfa26b8bb8e03b98e12513afdba2
-
SHA256
642211182634e9be9c048b693d757ef96f2ecd9af09b8a1365e7db9091abf28e
-
SHA512
81e1d73b412eaa379c69eb698902db80f6493777d4d7d22a78fad5a1491557c35de36d9db1fd9af1f3ee184afdca3c7f58ba7269cd194642832a9a35dbaae540
-
SSDEEP
1536:dpmbSQ6U3q7cCBT/lZsK/3DiQ+LiKimfFoktCe3fYRMo:WShU3q7cEDlCK/3DG9i8Fok06fYRP
Malware Config
Signatures
-
Contacts a large (36855) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 1435 642211182634e9be9c048b693d757ef96f2ecd9af09b8a1365e7db9091abf28e.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/22/cmdline File opened for reading /proc/84/cmdline File opened for reading /proc/163/cmdline File opened for reading /proc/972/cmdline File opened for reading /proc/2/cmdline File opened for reading /proc/70/cmdline File opened for reading /proc/72/cmdline File opened for reading /proc/439/cmdline File opened for reading /proc/930/cmdline File opened for reading /proc/1425/cmdline File opened for reading /proc/1518/cmdline File opened for reading /proc/23/cmdline File opened for reading /proc/269/cmdline File opened for reading /proc/1484/cmdline File opened for reading /proc/173/cmdline File opened for reading /proc/82/cmdline File opened for reading /proc/91/cmdline File opened for reading /proc/501/cmdline File opened for reading /proc/1078/cmdline File opened for reading /proc/15/cmdline File opened for reading /proc/989/cmdline File opened for reading /proc/1314/cmdline File opened for reading /proc/1409/cmdline File opened for reading /proc/1696/cmdline File opened for reading /proc/1948/cmdline File opened for reading /proc/1087/cmdline File opened for reading /proc/516/cmdline File opened for reading /proc/1422/cmdline File opened for reading /proc/1911/cmdline File opened for reading /proc/177/cmdline File opened for reading /proc/1040/cmdline File opened for reading /proc/1512/cmdline File opened for reading /proc/1515/cmdline File opened for reading /proc/780/cmdline File opened for reading /proc/78/cmdline File opened for reading /proc/1700/cmdline File opened for reading /proc/8/cmdline File opened for reading /proc/1388/cmdline File opened for reading /proc/71/cmdline File opened for reading /proc/1302/cmdline File opened for reading /proc/612/cmdline File opened for reading /proc/1417/cmdline File opened for reading /proc/1701/cmdline File opened for reading /proc/1705/cmdline File opened for reading /proc/164/cmdline File opened for reading /proc/176/cmdline File opened for reading /proc/799/cmdline File opened for reading /proc/1698/cmdline File opened for reading /proc/3/cmdline File opened for reading /proc/498/cmdline File opened for reading /proc/997/cmdline File opened for reading /proc/1407/cmdline File opened for reading /proc/1461/cmdline File opened for reading /proc/21/cmdline File opened for reading /proc/1405/cmdline File opened for reading /proc/570/cmdline File opened for reading /proc/450/cmdline File opened for reading /proc/670/cmdline File opened for reading /proc/785/cmdline File opened for reading /proc/961/cmdline File opened for reading /proc/1418/cmdline File opened for reading /proc/1697/cmdline File opened for reading /proc/1702/cmdline File opened for reading /proc/171/cmdline -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/���bin/systemd sh
Processes
-
/tmp/642211182634e9be9c048b693d757ef96f2ecd9af09b8a1365e7db9091abf28e.elf/tmp/642211182634e9be9c048b693d757ef96f2ecd9af09b8a1365e7db9091abf28e.elf1⤵
- Changes its process name
PID:1435 -
/bin/shsh -c "rm -rf bin/systemd && mkdir bin; >���bin/systemd && mv /tmp/642211182634e9be9c048b693d757ef96f2ecd9af09b8a1365e7db9091abf28e.elf bin/systemd; chmod 777 bin/systemd"2⤵
- Writes file to tmp directory
PID:1436 -
/usr/bin/rmrm -rf bin/systemd3⤵PID:1441
-
-
/usr/bin/mkdirmkdir bin3⤵PID:1449
-
-
/usr/bin/chmodchmod 777 bin/systemd3⤵PID:1453
-
-