Analysis
-
max time kernel
149s -
max time network
139s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
22-04-2024 01:49
Behavioral task
behavioral1
Sample
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf
-
Size
74KB
-
MD5
296cfde231042f4a645a26c25bf13a09
-
SHA1
a56da7a9c0511c08ab22bdf7d9f1ec0e1f6f7709
-
SHA256
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11
-
SHA512
cc8996561ae9691bcb6ed2b57cd9926276d3d131794bcefffbb047b4956650111c853a3f8845c0dd9d2cfbda6de2d681f1fb5bcdfb1d23169482623e94015ab0
-
SSDEEP
1536:JEfduRD5QPhnK/toxtIpunxn6ksx2mPx7yGMRmINK1Ga8hWaLYXw5VR:UdkOPhoaxtzxn6GmJyRmT1GtWacA57
Malware Config
Signatures
-
Processes:
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elfdescription ioc process File deleted /var/log/audit/audit.log b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf -
Deletes itself 1 IoCs
Processes:
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elfpid process 1479 b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf -
Processes:
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elfdescription ioc process File deleted /var/log/journal/4816dd152e8c48ff97e9117d197c13d8/system.journal b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf -
Deletes system logs 1 TTPs 1 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
Processes:
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elfdescription ioc process File deleted /var/log/syslog b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elfdescription ioc process File opened for modification /dev/watchdog b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf File opened for modification /dev/misc/watchdog b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf -
Deletes log files 1 TTPs 4 IoCs
Deletes log files on the system.
Processes:
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elfdescription ioc process File deleted /var/log/auth.log b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf File deleted /var/log/ubuntu-advantage.log b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf File deleted /var/log/kern.log b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf File deleted /var/log/apport.log b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
Processes:
b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself vlgb1fijr5nrfgn0g5feg8om 1479 b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf -
Reads CPU attributes 1 TTPs 10 IoCs
Processes:
pkillpkillpkillpkillpkillpkillpkillpkillpkillpkilldescription ioc process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
Processes:
pkillpkillpkillpkillpkillpkillpkillpkillpkillb6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elfpkilldescription ioc process File opened for reading /proc/828/status pkill File opened for reading /proc/1451/status pkill File opened for reading /proc/1490/status pkill File opened for reading /proc/1485/status pkill File opened for reading /proc/2/status pkill File opened for reading /proc/454/status pkill File opened for reading /proc/483/cmdline pkill File opened for reading /proc/1287/status pkill File opened for reading /proc/1417/cmdline pkill File opened for reading /proc/1486/cmdline pkill File opened for reading /proc/84/status pkill File opened for reading /proc/158/status pkill File opened for reading /proc/301/cmdline pkill File opened for reading /proc/438/cmdline pkill File opened for reading /proc/514/cmdline pkill File opened for reading /proc/930/status pkill File opened for reading /proc/76/cmdline pkill File opened for reading /proc/170/status pkill File opened for reading /proc/777/status pkill File opened for reading /proc/1050/status pkill File opened for reading /proc/71/cmdline pkill File opened for reading /proc/688/cmdline pkill File opened for reading /proc/1182/status pkill File opened for reading /proc/1492/cmdline pkill File opened for reading /proc/self/auxv pkill File opened for reading /proc/782/status pkill File opened for reading /proc/945/status pkill File opened for reading /proc/987/cmdline pkill File opened for reading /proc/1287/cmdline pkill File opened for reading /proc/777/cmdline pkill File opened for reading /proc/1/status pkill File opened for reading /proc/7/cmdline pkill File opened for reading /proc/169/status pkill File opened for reading /proc/688/status pkill File opened for reading /proc/1075/status pkill File opened for reading /proc/71/status pkill File opened for reading /proc/163/status pkill File opened for reading /proc/443/status pkill File opened for reading /proc/201/cmdline pkill File opened for reading /proc/666/status pkill File opened for reading /proc/782/cmdline pkill File opened for reading /proc/782/cmdline pkill File opened for reading /proc/1071/status pkill File opened for reading /proc/488/cmdline pkill File opened for reading /proc/993/cmdline b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf File opened for reading /proc/1396/cmdline b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf File opened for reading /proc/1137/cmdline b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf File opened for reading /proc/174/status pkill File opened for reading /proc/301/cmdline pkill File opened for reading /proc/443/status pkill File opened for reading /proc/638/status pkill File opened for reading /proc/1413/cmdline pkill File opened for reading /proc/1488/status pkill File opened for reading /proc/1062/cmdline b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf File opened for reading /proc/12/status pkill File opened for reading /proc/439/cmdline pkill File opened for reading /proc/453/status pkill File opened for reading /proc/609/status pkill File opened for reading /proc/1419/cmdline pkill File opened for reading /proc/1424/cmdline pkill File opened for reading /proc/1481/cmdline pkill File opened for reading /proc/177/status pkill File opened for reading /proc/666/cmdline pkill File opened for reading /proc/1033/status pkill
Processes
-
/tmp/b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf/tmp/b6538d6af7fc74e1f6d2d49177df9d83debbf5972f485812f5811920fd86ca11.elf1⤵
- Deletes Audit logs
- Deletes itself
- Deletes journal logs
- Deletes system logs
- Modifies Watchdog functionality
- Deletes log files
- Changes its process name
- Reads runtime system information
-
/usr/local/sbin/pkillpkill wireshark2⤵
-
/usr/local/bin/pkillpkill wireshark2⤵
-
/usr/sbin/pkillpkill wireshark2⤵
-
/usr/bin/pkillpkill wireshark2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/pkillpkill dumpcap2⤵
-
/usr/local/bin/pkillpkill dumpcap2⤵
-
/usr/sbin/pkillpkill dumpcap2⤵
-
/usr/bin/pkillpkill dumpcap2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/pkillpkill tshark2⤵
-
/usr/local/bin/pkillpkill tshark2⤵
-
/usr/local/sbin/pkillpkill ettercap2⤵
-
/usr/sbin/pkillpkill tshark2⤵
-
/usr/bin/pkillpkill tshark2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/bin/pkillpkill ettercap2⤵
-
/usr/sbin/pkillpkill ettercap2⤵
-
/usr/local/sbin/pkillpkill dsniff2⤵
-
/usr/local/sbin/pkillpkill tcpdump2⤵
-
/usr/bin/pkillpkill ettercap2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/bin/pkillpkill dsniff2⤵
-
/usr/local/sbin/pkillpkill ngrep2⤵
-
/usr/local/sbin/pkillpkill tcpflow2⤵
-
/usr/local/bin/pkillpkill tcpdump2⤵
-
/usr/sbin/pkillpkill dsniff2⤵
-
/usr/local/bin/pkillpkill ngrep2⤵
-
/usr/local/bin/pkillpkill tcpflow2⤵
-
/usr/bin/pkillpkill dsniff2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/sbin/pkillpkill tcpdump2⤵
-
/usr/sbin/pkillpkill ngrep2⤵
-
/usr/bin/pkillpkill tcpdump2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/sbin/pkillpkill tcpflow2⤵
-
/usr/bin/pkillpkill ngrep2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/bin/pkillpkill tcpflow2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/pkillpkill windump2⤵
-
/usr/local/bin/pkillpkill windump2⤵
-
/usr/sbin/pkillpkill windump2⤵
-
/usr/bin/pkillpkill windump2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/pkillpkill netsniff-ng2⤵
-
/usr/local/bin/pkillpkill netsniff-ng2⤵
-
/usr/sbin/pkillpkill netsniff-ng2⤵
-
/usr/bin/pkillpkill netsniff-ng2⤵
- Reads CPU attributes
- Reads runtime system information
-
/usr/local/sbin/rmrm -rf /usr/bin/ettercap2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/ettercap2⤵
-
/usr/sbin/rmrm -rf /usr/bin/ettercap2⤵
-
/usr/bin/rmrm -rf /usr/bin/ettercap2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/dsniff2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/dsniff2⤵
-
/usr/sbin/rmrm -rf /usr/bin/dsniff2⤵
-
/usr/bin/rmrm -rf /usr/bin/dsniff2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/ngrep2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/ngrep2⤵
-
/usr/sbin/rmrm -rf /usr/bin/ngrep2⤵
-
/usr/bin/rmrm -rf /usr/bin/ngrep2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/tcpflow2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/tcpflow2⤵
-
/usr/sbin/rmrm -rf /usr/bin/tcpflow2⤵
-
/usr/bin/rmrm -rf /usr/bin/tcpflow2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/netsniff-ng2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/netsniff-ng2⤵
-
/usr/sbin/rmrm -rf /usr/bin/netsniff-ng2⤵
-
/usr/bin/rmrm -rf /usr/bin/netsniff-ng2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/ngrep2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/ngrep2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/ngrep2⤵
-
/usr/bin/rmrm -rf /usr/sbin/ngrep2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/tcpflow2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/tcpflow2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/tcpflow2⤵
-
/usr/bin/rmrm -rf /usr/sbin/tcpflow2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/windump2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/windump2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/windump2⤵
-
/usr/bin/rmrm -rf /usr/sbin/windump2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/netsniff-ng2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/netsniff-ng2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/netsniff-ng2⤵
-
/usr/bin/rmrm -rf /usr/sbin/netsniff-ng2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/tcpdump2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/tcpdump2⤵
-
/usr/sbin/rmrm -rf /usr/bin/tcpdump2⤵
-
/usr/bin/rmrm -rf /usr/bin/tcpdump2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/tshark2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/tshark2⤵
-
/usr/sbin/rmrm -rf /usr/bin/tshark2⤵
-
/usr/bin/rmrm -rf /usr/bin/tshark2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/wireshark2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/wireshark2⤵
-
/usr/sbin/rmrm -rf /usr/bin/wireshark2⤵
-
/usr/bin/rmrm -rf /usr/bin/wireshark2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/dumpcap2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/dumpcap2⤵
-
/usr/sbin/rmrm -rf /usr/bin/dumpcap2⤵
-
/usr/bin/rmrm -rf /usr/bin/dumpcap2⤵
-
/usr/local/sbin/rmrm -rf /usr/bin/windump2⤵
-
/usr/local/bin/rmrm -rf /usr/bin/windump2⤵
-
/usr/sbin/rmrm -rf /usr/bin/windump2⤵
-
/usr/bin/rmrm -rf /usr/bin/windump2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/dsniff2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/dsniff2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/dsniff2⤵
-
/usr/bin/rmrm -rf /usr/sbin/dsniff2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/ettercap2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/ettercap2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/ettercap2⤵
-
/usr/bin/rmrm -rf /usr/sbin/ettercap2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/dumpcap2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/dumpcap2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/dumpcap2⤵
-
/usr/bin/rmrm -rf /usr/sbin/dumpcap2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/wireshark2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/wireshark2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/wireshark2⤵
-
/usr/bin/rmrm -rf /usr/sbin/wireshark2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/tshark2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/tshark2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/tshark2⤵
-
/usr/bin/rmrm -rf /usr/sbin/tshark2⤵
-
/usr/local/sbin/rmrm -rf /usr/sbin/tcpdump2⤵
-
/usr/local/bin/rmrm -rf /usr/sbin/tcpdump2⤵
-
/usr/sbin/rmrm -rf /usr/sbin/tcpdump2⤵
-
/usr/bin/rmrm -rf /usr/sbin/tcpdump2⤵