Analysis

  • max time kernel
    145s
  • max time network
    132s
  • platform
    ubuntu-20.04_amd64
  • resource
    ubuntu2004-amd64-20240221-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system
  • submitted
    15/04/2024, 01:27

General

  • Target

    5c46146d3566bbfd86d75cc01de0cbafa2bb1e123b2ebcd253977094de3b64c7.elf

  • Size

    100KB

  • MD5

    865e5bf7ddaf989da8c23a43b5d33a2d

  • SHA1

    1076a7da2b89d4e846aa33629b8591b6210a94b9

  • SHA256

    5c46146d3566bbfd86d75cc01de0cbafa2bb1e123b2ebcd253977094de3b64c7

  • SHA512

    513536cdfad2e3f8f69fb93fcb2b4fba376396d51dc23ec7a7524539f9516c0cb1a3b31a23dc7591b916a8eb725d17c3fa85deeb58d084362a1ebad4d932fbed

  • SSDEEP

    3072:12qG2kUOfTLSCBKQsKS/UJLm8Q8qmFnsGL/w0m:12OktbOCBxacJLm8qmFnsGL/w0m

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/5c46146d3566bbfd86d75cc01de0cbafa2bb1e123b2ebcd253977094de3b64c7.elf
    /tmp/5c46146d3566bbfd86d75cc01de0cbafa2bb1e123b2ebcd253977094de3b64c7.elf
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:1476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads