Analysis
-
max time kernel
149s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240226-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19/04/2024, 02:06
General
-
Target
eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d.elf
-
Size
29KB
-
MD5
7c2da8202951debe176fc47541ae754c
-
SHA1
ed011df676af41489ef38213af10b5c70831ec0d
-
SHA256
eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d
-
SHA512
d489bb706464baf4e6431077feb9ac5f85b6898e3faeffe06d3f093dbe59b80e7de5285743b0443ff1c512cfeefc223879d5adb2f0a321c5411aaf707bb4f4af
-
SSDEEP
768:ELZW56tNDAFiY4FGG1Nn8MPDEzg6cHoC5Is7nbcuyD7U0/2j:FMtmij8wyVcj5dnouy8jj
Malware Config
Extracted
mirai
KYTON
Signatures
-
Contacts a large (111541) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 1564 eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc File opened for reading /proc/net/tcp -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc File opened for modification /bin/watchdog -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 2 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d.elf File opened for reading /proc/1567/exe Process not Found