Analysis
-
max time kernel
150s -
max time network
154s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
17-04-2024 01:07
Behavioral task
behavioral1
Sample
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf
-
Size
74KB
-
MD5
20d263bd6e0552cad17ec45eeff1844b
-
SHA1
67a23901d5f3276ba4e8c95c21aeb79ca584a36a
-
SHA256
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b
-
SHA512
f721ddcbcb19d22057d8a4b7402fa8d852872b3df3de18a13b8c983407fb29cd06ef7b9c35c4c50a179ac98fd2e70296806487fc59d4a9e291fa248662ac5eef
-
SSDEEP
1536:EUPldq0TJFnqXKvdo7DYZXjs56tbWuhyN/XemIdRI1R+5vY1SLq7wTVVi:9NdDznqoK7D4s5UWxem0I1R+JeSOcTf
Malware Config
Signatures
-
Changes its process name 1 IoCs
Processes:
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself mlf4pvwv560dntpv 1471 648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf -
Deletes itself 1 IoCs
Processes:
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elfpid process 1471 648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf -
Processes:
description ioc File deleted /var/log/journal/4816dd152e8c48ff97e9117d197c13d8/system.journal -
Deletes system logs 1 TTPs 1 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elfdescription ioc process File opened for modification /dev/misc/watchdog 648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf File opened for modification /dev/watchdog 648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf -
Deletes log files 1 TTPs 4 IoCs
Deletes log files on the system.
Processes:
description ioc File deleted /var/log/auth.log File deleted /var/log/ubuntu-advantage.log File deleted /var/log/kern.log File deleted /var/log/apport.log -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes 1 TTPs 10 IoCs
Processes:
pkillpkillpkillpkillpkillpkillpkillpkillpkillpkilldescription ioc process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
Processes:
pkillpkillpkillpkillpkillpkillpkillpkillpkillpkilldescription ioc process File opened for reading /proc/394/status pkill File opened for reading /proc/494/cmdline pkill File opened for reading /proc/81/cmdline File opened for reading /proc/84/status pkill File opened for reading /proc/201/cmdline pkill File opened for reading /proc/70/status pkill File opened for reading /proc/615/cmdline pkill File opened for reading /proc/837/status pkill File opened for reading /proc/913/status pkill File opened for reading /proc/1103/status pkill File opened for reading /proc/23/cmdline pkill File opened for reading /proc/22/cmdline pkill File opened for reading /proc/1030/status pkill File opened for reading /proc/21/status pkill File opened for reading /proc/394/status pkill File opened for reading /proc/168/status pkill File opened for reading /proc/11/cmdline File opened for reading /proc/622/status pkill File opened for reading /proc/837/status pkill File opened for reading /proc/1406/status pkill File opened for reading /proc/1317/cmdline pkill File opened for reading /proc/1085/status pkill File opened for reading /proc/20/status pkill File opened for reading /proc/806/status pkill File opened for reading /proc/612/status pkill File opened for reading /proc/1294/cmdline pkill File opened for reading /proc/1074/cmdline pkill File opened for reading /proc/1030/status pkill File opened for reading /proc/1473/status pkill File opened for reading /proc/470/cmdline pkill File opened for reading /proc/514/status pkill File opened for reading /proc/158/status pkill File opened for reading /proc/642/status pkill File opened for reading /proc/978/cmdline pkill File opened for reading /proc/75/cmdline File opened for reading /proc/937/cmdline File opened for reading /proc/1403/cmdline File opened for reading /proc/612/status pkill File opened for reading /proc/642/status pkill File opened for reading /proc/781/status pkill File opened for reading /proc/1085/cmdline pkill File opened for reading /proc/1406/cmdline pkill File opened for reading /proc/75/status pkill File opened for reading /proc/90/cmdline pkill File opened for reading /proc/102/status pkill File opened for reading /proc/1442/status pkill File opened for reading /proc/1040/status pkill File opened for reading /proc/4/status pkill File opened for reading /proc/958/status pkill File opened for reading /proc/668/cmdline pkill File opened for reading /proc/969/status pkill File opened for reading /proc/1144/cmdline pkill File opened for reading /proc/93/cmdline File opened for reading /proc/9/status pkill File opened for reading /proc/73/cmdline pkill File opened for reading /proc/556/cmdline pkill File opened for reading /proc/494/status pkill File opened for reading /proc/1478/status pkill File opened for reading /proc/1482/cmdline pkill File opened for reading /proc/201/status pkill File opened for reading /proc/453/status pkill File opened for reading /proc/1085/status pkill File opened for reading /proc/84/status pkill File opened for reading /proc/502/status pkill
Processes
-
/tmp/648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf/tmp/648fcb9bac190539eda0026332834bb94f935c3c2817864d8d26f21bdd35989b.elf1⤵
- Changes its process name
- Deletes itself
- Modifies Watchdog functionality
-
/usr/local/sbin/pkillpkill tshark1⤵
-
/usr/local/bin/pkillpkill tshark1⤵
-
/usr/sbin/pkillpkill tshark1⤵
-
/usr/bin/pkillpkill tshark1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/pkillpkill tcpdump1⤵
-
/usr/local/sbin/pkillpkill wireshark1⤵
-
/usr/local/bin/pkillpkill tcpdump1⤵
-
/usr/local/bin/pkillpkill wireshark1⤵
-
/usr/sbin/pkillpkill tcpdump1⤵
-
/usr/bin/pkillpkill tcpdump1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/sbin/pkillpkill wireshark1⤵
-
/usr/local/sbin/pkillpkill dumpcap1⤵
-
/usr/bin/pkillpkill wireshark1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/bin/pkillpkill dumpcap1⤵
-
/usr/local/sbin/pkillpkill ettercap1⤵
-
/usr/sbin/pkillpkill dumpcap1⤵
-
/usr/local/bin/pkillpkill ettercap1⤵
-
/usr/bin/pkillpkill dumpcap1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/pkillpkill dsniff1⤵
-
/usr/sbin/pkillpkill ettercap1⤵
-
/usr/local/bin/pkillpkill dsniff1⤵
-
/usr/bin/pkillpkill ettercap1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/pkillpkill ngrep1⤵
-
/usr/sbin/pkillpkill dsniff1⤵
-
/usr/bin/pkillpkill dsniff1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/bin/pkillpkill ngrep1⤵
-
/usr/local/sbin/pkillpkill tcpflow1⤵
-
/usr/sbin/pkillpkill ngrep1⤵
-
/usr/bin/pkillpkill ngrep1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/pkillpkill windump1⤵
-
/usr/local/bin/pkillpkill tcpflow1⤵
-
/usr/local/bin/pkillpkill windump1⤵
-
/usr/local/sbin/pkillpkill netsniff-ng1⤵
-
/usr/sbin/pkillpkill tcpflow1⤵
-
/usr/sbin/pkillpkill windump1⤵
-
/usr/bin/pkillpkill tcpflow1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/bin/pkillpkill windump1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/bin/pkillpkill netsniff-ng1⤵
-
/usr/sbin/pkillpkill netsniff-ng1⤵
-
/usr/bin/pkillpkill netsniff-ng1⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/rmrm -rf /usr/bin/ettercap1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/dsniff1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/ngrep1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/tcpflow1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/netsniff-ng1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/ngrep1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/tcpflow1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/windump1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/netsniff-ng1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/tcpdump1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/tshark1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/wireshark1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/dumpcap1⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/windump1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/windump1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/tcpflow1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/wireshark1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/ngrep1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/ngrep1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/dumpcap1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/tcpdump1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/windump1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/tshark1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/netsniff-ng1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/tcpflow1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/netsniff-ng1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/dsniff1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/dsniff1⤵
-
/usr/local/bin/rmrm -rf /usr/bin/ettercap1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/windump1⤵
-
/usr/sbin/rmrm -rf /usr/bin/dumpcap1⤵
-
/usr/sbin/rmrm -rf /usr/bin/netsniff-ng1⤵
-
/usr/sbin/rmrm -rf /usr/bin/ngrep1⤵
-
/usr/sbin/rmrm -rf /usr/bin/tcpflow1⤵
-
/usr/sbin/rmrm -rf /usr/bin/tcpdump1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/netsniff-ng1⤵
-
/usr/sbin/rmrm -rf /usr/bin/wireshark1⤵
-
/usr/sbin/rmrm -rf /usr/bin/tshark1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/ngrep1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/tcpflow1⤵
-
/usr/sbin/rmrm -rf /usr/bin/dsniff1⤵
-
/usr/sbin/rmrm -rf /usr/bin/windump1⤵
-
/usr/sbin/rmrm -rf /usr/bin/ettercap1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/dsniff1⤵
-
/usr/bin/rmrm -rf /usr/bin/wireshark1⤵
-
/usr/bin/rmrm -rf /usr/sbin/ngrep1⤵
-
/usr/bin/rmrm -rf /usr/sbin/netsniff-ng1⤵
-
/usr/bin/rmrm -rf /usr/bin/netsniff-ng1⤵
-
/usr/bin/rmrm -rf /usr/bin/tshark1⤵
-
/usr/bin/rmrm -rf /usr/bin/tcpdump1⤵
-
/usr/bin/rmrm -rf /usr/sbin/tcpflow1⤵
-
/usr/bin/rmrm -rf /usr/bin/tcpflow1⤵
-
/usr/bin/rmrm -rf /usr/bin/dumpcap1⤵
-
/usr/bin/rmrm -rf /usr/sbin/windump1⤵
-
/usr/bin/rmrm -rf /usr/bin/dsniff1⤵
-
/usr/bin/rmrm -rf /usr/bin/windump1⤵
-
/usr/bin/rmrm -rf /usr/bin/ettercap1⤵
-
/usr/bin/rmrm -rf /usr/bin/ngrep1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/ettercap1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/dsniff1⤵
-
/usr/bin/rmrm -rf /usr/sbin/dsniff1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/ettercap1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/wireshark1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/ettercap1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/dumpcap1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/wireshark1⤵
-
/usr/bin/rmrm -rf /usr/sbin/ettercap1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/dumpcap1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/wireshark1⤵
-
/usr/bin/rmrm -rf /usr/sbin/wireshark1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/dumpcap1⤵
-
/usr/bin/rmrm -rf /usr/sbin/dumpcap1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/tshark1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/tshark1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/tshark1⤵
-
/usr/bin/rmrm -rf /usr/sbin/tshark1⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/tcpdump1⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/tcpdump1⤵
-
/usr/sbin/rmrm -rf /usr/sbin/tcpdump1⤵
-
/usr/bin/rmrm -rf /usr/sbin/tcpdump1⤵