Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240226-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
16-04-2024 01:12
Behavioral task
behavioral1
Sample
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf
-
Size
74KB
-
MD5
20d263bd6e0552cad17ec45eeff1844b
-
SHA1
67a23901d5f3276ba4e8c95c21aeb79ca584a36a
-
SHA256
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b
-
SHA512
f721ddcbcb19d22057d8a4b7402fa8d852872b3df3de18a13b8c983407fb29cd06ef7b9c35c4c50a179ac98fd2e70296806487fc59d4a9e291fa248662ac5eef
-
SSDEEP
1536:EUPldq0TJFnqXKvdo7DYZXjs56tbWuhyN/XemIdRI1R+5vY1SLq7wTVVi:9NdDznqoK7D4s5UWxem0I1R+JeSOcTf
Malware Config
Signatures
-
Changes its process name 1 IoCs
Processes:
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself t10vfkgrpbjqdmd7 1574 648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf -
Deletes itself 1 IoCs
Processes:
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elfpid process 1574 648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf -
Processes:
description ioc File deleted /var/log/journal/11c67417355f45d397f6be11f62e85a6/system.journal -
Deletes system logs 1 TTPs 1 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elfdescription ioc process File opened for modification /dev/misc/watchdog 648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf File opened for modification /dev/watchdog 648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 10 IoCs
Processes:
pkillpkillpkillpkillpkillpkillpkillpkillpkillpkilldescription ioc process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
Processes:
pkillpkillpkillpkillpkillpkillpkillpkillpkillpkilldescription ioc process File opened for reading /proc/36/status pkill File opened for reading /proc/31/cmdline pkill File opened for reading /proc/1137/cmdline pkill File opened for reading /proc/1363/status pkill File opened for reading /proc/1570/cmdline pkill File opened for reading /proc/3/cmdline pkill File opened for reading /proc/19/cmdline pkill File opened for reading /proc/172/status pkill File opened for reading /proc/1167/status pkill File opened for reading /proc/1196/cmdline pkill File opened for reading /proc/180/cmdline File opened for reading /proc/32/cmdline pkill File opened for reading /proc/171/status pkill File opened for reading /proc/429/cmdline pkill File opened for reading /proc/520/status pkill File opened for reading /proc/1129/cmdline pkill File opened for reading /proc/80/status pkill File opened for reading /proc/166/status pkill File opened for reading /proc/1121/cmdline pkill File opened for reading /proc/1360/cmdline pkill File opened for reading /proc/1576/cmdline pkill File opened for reading /proc/6/status pkill File opened for reading /proc/20/cmdline pkill File opened for reading /proc/454/cmdline pkill File opened for reading /proc/1155/cmdline pkill File opened for reading /proc/1363/status pkill File opened for reading /proc/1584/cmdline pkill File opened for reading /proc/13/cmdline pkill File opened for reading /proc/27/status pkill File opened for reading /proc/171/cmdline pkill File opened for reading /proc/492/status pkill File opened for reading /proc/1181/status pkill File opened for reading /proc/1189/status pkill File opened for reading /proc/1577/status pkill File opened for reading /proc/78/status pkill File opened for reading /proc/601/cmdline pkill File opened for reading /proc/1196/cmdline pkill File opened for reading /proc/1570/cmdline pkill File opened for reading /proc/1647/cmdline File opened for reading /proc/10/status pkill File opened for reading /proc/470/status pkill File opened for reading /proc/1193/cmdline pkill File opened for reading /proc/1296/status pkill File opened for reading /proc/1579/status pkill File opened for reading /proc/169/cmdline pkill File opened for reading /proc/438/status pkill File opened for reading /proc/1053/status pkill File opened for reading /proc/1121/status pkill File opened for reading /proc/22/status pkill File opened for reading /proc/25/cmdline pkill File opened for reading /proc/454/cmdline pkill File opened for reading /proc/718/cmdline pkill File opened for reading /proc/1200/status pkill File opened for reading /proc/1579/cmdline pkill File opened for reading /proc/30/status pkill File opened for reading /proc/1576/cmdline pkill File opened for reading /proc/164/cmdline pkill File opened for reading /proc/522/status pkill File opened for reading /proc/971/cmdline pkill File opened for reading /proc/1098/status pkill File opened for reading /proc/1461/cmdline pkill File opened for reading /proc/79/status pkill File opened for reading /proc/1076/status pkill File opened for reading /proc/1155/cmdline pkill
Processes
-
/tmp/648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf/tmp/648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf1⤵
- Changes its process name
- Deletes itself
- Modifies Watchdog functionality
PID:1574
-
/usr/local/sbin/pkillpkill wireshark1⤵PID:1578
-
/usr/local/bin/pkillpkill wireshark1⤵PID:1578
-
/usr/sbin/pkillpkill wireshark1⤵PID:1578
-
/usr/bin/pkillpkill wireshark1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1578
-
/usr/local/sbin/pkillpkill dumpcap1⤵PID:1579
-
/usr/local/bin/pkillpkill dumpcap1⤵PID:1579
-
/usr/sbin/pkillpkill dumpcap1⤵PID:1579
-
/usr/bin/pkillpkill dumpcap1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1579
-
/usr/local/sbin/pkillpkill tshark1⤵PID:1577
-
/usr/local/bin/pkillpkill tshark1⤵PID:1577
-
/usr/sbin/pkillpkill tshark1⤵PID:1577
-
/usr/bin/pkillpkill tshark1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1577
-
/usr/local/sbin/pkillpkill ettercap1⤵PID:1580
-
/usr/local/bin/pkillpkill ettercap1⤵PID:1580
-
/usr/sbin/pkillpkill ettercap1⤵PID:1580
-
/usr/bin/pkillpkill ettercap1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1580
-
/usr/local/sbin/pkillpkill dsniff1⤵PID:1581
-
/usr/local/bin/pkillpkill dsniff1⤵PID:1581
-
/usr/sbin/pkillpkill dsniff1⤵PID:1581
-
/usr/bin/pkillpkill dsniff1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1581
-
/usr/local/sbin/pkillpkill ngrep1⤵PID:1582
-
/usr/local/bin/pkillpkill ngrep1⤵PID:1582
-
/usr/sbin/pkillpkill ngrep1⤵PID:1582
-
/usr/bin/pkillpkill ngrep1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1582
-
/usr/local/sbin/pkillpkill netsniff-ng1⤵PID:1585
-
/usr/local/sbin/pkillpkill tcpdump1⤵PID:1576
-
/usr/local/sbin/pkillpkill windump1⤵PID:1584
-
/usr/local/bin/pkillpkill netsniff-ng1⤵PID:1585
-
/usr/sbin/pkillpkill netsniff-ng1⤵PID:1585
-
/usr/local/bin/pkillpkill tcpdump1⤵PID:1576
-
/usr/local/bin/pkillpkill windump1⤵PID:1584
-
/usr/local/sbin/pkillpkill tcpflow1⤵PID:1583
-
/usr/bin/pkillpkill netsniff-ng1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1585
-
/usr/sbin/pkillpkill tcpdump1⤵PID:1576
-
/usr/sbin/pkillpkill windump1⤵PID:1584
-
/usr/local/bin/pkillpkill tcpflow1⤵PID:1583
-
/usr/bin/pkillpkill tcpdump1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1576
-
/usr/bin/pkillpkill windump1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1584
-
/usr/sbin/pkillpkill tcpflow1⤵PID:1583
-
/usr/bin/pkillpkill tcpflow1⤵
- Reads CPU attributes
- Reads runtime system information
PID:1583
-
/usr/local/sbin/rmrm -rf /usr/sbin/ngrep1⤵PID:1595
-
/usr/local/bin/rmrm -rf /usr/sbin/ngrep1⤵PID:1595
-
/usr/sbin/rmrm -rf /usr/sbin/ngrep1⤵PID:1595
-
/usr/bin/rmrm -rf /usr/sbin/ngrep1⤵PID:1595
-
/sbin/rmrm -rf /usr/sbin/ngrep1⤵PID:1595
-
/bin/rmrm -rf /usr/sbin/ngrep1⤵PID:1595
-
/usr/local/sbin/rmrm -rf /usr/sbin/tcpflow1⤵PID:1596
-
/usr/local/bin/rmrm -rf /usr/sbin/tcpflow1⤵PID:1596
-
/usr/sbin/rmrm -rf /usr/sbin/tcpflow1⤵PID:1596
-
/usr/bin/rmrm -rf /usr/sbin/tcpflow1⤵PID:1596
-
/sbin/rmrm -rf /usr/sbin/tcpflow1⤵PID:1596
-
/bin/rmrm -rf /usr/sbin/tcpflow1⤵PID:1596
-
/usr/local/sbin/rmrm -rf /usr/bin/tshark1⤵PID:1600
-
/usr/local/bin/rmrm -rf /usr/bin/tshark1⤵PID:1600
-
/usr/sbin/rmrm -rf /usr/bin/tshark1⤵PID:1600
-
/usr/bin/rmrm -rf /usr/bin/tshark1⤵PID:1600
-
/sbin/rmrm -rf /usr/bin/tshark1⤵PID:1600
-
/bin/rmrm -rf /usr/bin/tshark1⤵PID:1600
-
/usr/local/sbin/rmrm -rf /usr/bin/ettercap1⤵PID:1603
-
/usr/local/bin/rmrm -rf /usr/bin/ettercap1⤵PID:1603
-
/usr/sbin/rmrm -rf /usr/bin/ettercap1⤵PID:1603
-
/usr/bin/rmrm -rf /usr/bin/ettercap1⤵PID:1603
-
/sbin/rmrm -rf /usr/bin/ettercap1⤵PID:1603
-
/usr/local/sbin/rmrm -rf /usr/bin/dsniff1⤵PID:1604
-
/usr/local/bin/rmrm -rf /usr/bin/dsniff1⤵PID:1604
-
/usr/sbin/rmrm -rf /usr/bin/dsniff1⤵PID:1604
-
/usr/bin/rmrm -rf /usr/bin/dsniff1⤵PID:1604
-
/sbin/rmrm -rf /usr/bin/dsniff1⤵PID:1604
-
/bin/rmrm -rf /usr/bin/dsniff1⤵PID:1604
-
/usr/local/sbin/rmrm -rf /usr/bin/ngrep1⤵PID:1605
-
/usr/local/bin/rmrm -rf /usr/bin/ngrep1⤵PID:1605
-
/usr/sbin/rmrm -rf /usr/bin/ngrep1⤵PID:1605
-
/usr/bin/rmrm -rf /usr/bin/ngrep1⤵PID:1605
-
/sbin/rmrm -rf /usr/bin/ngrep1⤵PID:1605
-
/bin/rmrm -rf /usr/bin/ngrep1⤵PID:1605
-
/usr/local/sbin/rmrm -rf /usr/bin/tcpflow1⤵PID:1606
-
/usr/local/bin/rmrm -rf /usr/bin/tcpflow1⤵PID:1606
-
/usr/sbin/rmrm -rf /usr/bin/tcpflow1⤵PID:1606
-
/usr/bin/rmrm -rf /usr/bin/tcpflow1⤵PID:1606
-
/sbin/rmrm -rf /usr/bin/tcpflow1⤵PID:1606
-
/bin/rmrm -rf /usr/bin/tcpflow1⤵PID:1606
-
/usr/local/sbin/rmrm -rf /usr/bin/netsniff-ng1⤵PID:1608
-
/usr/local/bin/rmrm -rf /usr/bin/netsniff-ng1⤵PID:1608
-
/usr/sbin/rmrm -rf /usr/bin/netsniff-ng1⤵PID:1608
-
/usr/bin/rmrm -rf /usr/bin/netsniff-ng1⤵PID:1608
-
/sbin/rmrm -rf /usr/bin/netsniff-ng1⤵PID:1608
-
/bin/rmrm -rf /usr/bin/netsniff-ng1⤵PID:1608
-
/usr/local/sbin/rmrm -rf /usr/sbin/windump1⤵PID:1597
-
/usr/local/bin/rmrm -rf /usr/sbin/windump1⤵PID:1597
-
/usr/sbin/rmrm -rf /usr/sbin/windump1⤵PID:1597
-
/usr/bin/rmrm -rf /usr/sbin/windump1⤵PID:1597
-
/sbin/rmrm -rf /usr/sbin/windump1⤵PID:1597
-
/bin/rmrm -rf /usr/sbin/windump1⤵PID:1597
-
/usr/local/sbin/rmrm -rf /usr/sbin/netsniff-ng1⤵PID:1598
-
/usr/local/bin/rmrm -rf /usr/sbin/netsniff-ng1⤵PID:1598
-
/usr/sbin/rmrm -rf /usr/sbin/netsniff-ng1⤵PID:1598
-
/usr/bin/rmrm -rf /usr/sbin/netsniff-ng1⤵PID:1598
-
/sbin/rmrm -rf /usr/sbin/netsniff-ng1⤵PID:1598
-
/bin/rmrm -rf /usr/sbin/netsniff-ng1⤵PID:1598
-
/usr/local/sbin/rmrm -rf /usr/bin/tcpdump1⤵PID:1599
-
/usr/local/bin/rmrm -rf /usr/bin/tcpdump1⤵PID:1599
-
/usr/sbin/rmrm -rf /usr/bin/tcpdump1⤵PID:1599
-
/usr/bin/rmrm -rf /usr/bin/tcpdump1⤵PID:1599
-
/sbin/rmrm -rf /usr/bin/tcpdump1⤵PID:1599
-
/bin/rmrm -rf /usr/bin/tcpdump1⤵PID:1599
-
/usr/local/sbin/rmrm -rf /usr/bin/wireshark1⤵PID:1601
-
/usr/local/bin/rmrm -rf /usr/bin/wireshark1⤵PID:1601
-
/usr/sbin/rmrm -rf /usr/bin/wireshark1⤵PID:1601
-
/usr/bin/rmrm -rf /usr/bin/wireshark1⤵PID:1601
-
/sbin/rmrm -rf /usr/bin/wireshark1⤵PID:1601
-
/bin/rmrm -rf /usr/bin/wireshark1⤵PID:1601
-
/usr/local/sbin/rmrm -rf /usr/bin/dumpcap1⤵PID:1602
-
/usr/local/bin/rmrm -rf /usr/bin/dumpcap1⤵PID:1602
-
/usr/sbin/rmrm -rf /usr/bin/dumpcap1⤵PID:1602
-
/usr/bin/rmrm -rf /usr/bin/dumpcap1⤵PID:1602
-
/sbin/rmrm -rf /usr/bin/dumpcap1⤵PID:1602
-
/bin/rmrm -rf /usr/bin/dumpcap1⤵PID:1602
-
/usr/local/sbin/rmrm -rf /usr/bin/windump1⤵PID:1607
-
/usr/local/bin/rmrm -rf /usr/bin/windump1⤵PID:1607
-
/usr/sbin/rmrm -rf /usr/bin/windump1⤵PID:1607
-
/usr/bin/rmrm -rf /usr/bin/windump1⤵PID:1607
-
/sbin/rmrm -rf /usr/bin/windump1⤵PID:1607
-
/bin/rmrm -rf /usr/bin/windump1⤵PID:1607
-
/usr/local/sbin/rmrm -rf /usr/sbin/dsniff1⤵PID:1594
-
/usr/local/bin/rmrm -rf /usr/sbin/dsniff1⤵PID:1594
-
/usr/sbin/rmrm -rf /usr/sbin/dsniff1⤵PID:1594
-
/usr/bin/rmrm -rf /usr/sbin/dsniff1⤵PID:1594
-
/sbin/rmrm -rf /usr/sbin/dsniff1⤵PID:1594
-
/bin/rmrm -rf /usr/sbin/dsniff1⤵PID:1594
-
/usr/local/sbin/rmrm -rf /usr/sbin/ettercap1⤵PID:1593
-
/usr/local/bin/rmrm -rf /usr/sbin/ettercap1⤵PID:1593
-
/usr/sbin/rmrm -rf /usr/sbin/ettercap1⤵PID:1593
-
/usr/bin/rmrm -rf /usr/sbin/ettercap1⤵PID:1593
-
/sbin/rmrm -rf /usr/sbin/ettercap1⤵PID:1593
-
/bin/rmrm -rf /usr/sbin/ettercap1⤵PID:1593
-
/bin/rmrm -rf /usr/bin/ettercap1⤵PID:1603
-
/usr/local/sbin/rmrm -rf /usr/sbin/dumpcap1⤵PID:1592
-
/usr/local/bin/rmrm -rf /usr/sbin/dumpcap1⤵PID:1592
-
/usr/sbin/rmrm -rf /usr/sbin/dumpcap1⤵PID:1592
-
/usr/bin/rmrm -rf /usr/sbin/dumpcap1⤵PID:1592
-
/sbin/rmrm -rf /usr/sbin/dumpcap1⤵PID:1592
-
/bin/rmrm -rf /usr/sbin/dumpcap1⤵PID:1592
-
/usr/local/sbin/rmrm -rf /usr/sbin/wireshark1⤵PID:1591
-
/usr/local/bin/rmrm -rf /usr/sbin/wireshark1⤵PID:1591
-
/usr/sbin/rmrm -rf /usr/sbin/wireshark1⤵PID:1591
-
/usr/bin/rmrm -rf /usr/sbin/wireshark1⤵PID:1591
-
/sbin/rmrm -rf /usr/sbin/wireshark1⤵PID:1591
-
/bin/rmrm -rf /usr/sbin/wireshark1⤵PID:1591
-
/usr/local/sbin/rmrm -rf /usr/sbin/tshark1⤵PID:1590
-
/usr/local/bin/rmrm -rf /usr/sbin/tshark1⤵PID:1590
-
/usr/sbin/rmrm -rf /usr/sbin/tshark1⤵PID:1590
-
/usr/bin/rmrm -rf /usr/sbin/tshark1⤵PID:1590
-
/sbin/rmrm -rf /usr/sbin/tshark1⤵PID:1590
-
/bin/rmrm -rf /usr/sbin/tshark1⤵PID:1590
-
/usr/local/sbin/rmrm -rf /usr/sbin/tcpdump1⤵PID:1589
-
/usr/local/bin/rmrm -rf /usr/sbin/tcpdump1⤵PID:1589
-
/usr/sbin/rmrm -rf /usr/sbin/tcpdump1⤵PID:1589
-
/usr/bin/rmrm -rf /usr/sbin/tcpdump1⤵PID:1589
-
/sbin/rmrm -rf /usr/sbin/tcpdump1⤵PID:1589
-
/bin/rmrm -rf /usr/sbin/tcpdump1⤵PID:1589