Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240508-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    21-05-2024 10:38

General

  • Target

    1fa6befa83300967bbd31b7aa745f972.elf

  • Size

    60KB

  • MD5

    1fa6befa83300967bbd31b7aa745f972

  • SHA1

    8a09dc37d02796146b40e336c7a9c9c5ebba4e8b

  • SHA256

    3b7e69fb314ffdeb13c36e9ecf20a9476f34374c30ce437dea4e0db193ceb1d8

  • SHA512

    a90fb7b23ae9087db504b1778b1bbbca16b147e5cf68646045f710032a8cf5fb92561525fd8df41b0584de83313bc099711f3f4081d781be713031ef8b6dfb41

  • SSDEEP

    1536:W/4vP/fDv1Y7GuNNq4vMSvglokUx3108OFfGPw/62cHBwr:Aa71Y7GuK4vn3+E9HO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Changes its process name 2 IoCs
  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/1fa6befa83300967bbd31b7aa745f972.elf
    /tmp/1fa6befa83300967bbd31b7aa745f972.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Changes its process name
    • Checks CPU configuration
    PID:1512
    • /bin/sh
      sh -c "ps -eo pid,tty | grep -E 'pts|tty' | awk '{print \$1}'"
      2⤵
        PID:1517
        • /usr/bin/awk
          awk "{print \$1}"
          3⤵
            PID:1520
          • /bin/grep
            grep -E "pts|tty"
            3⤵
              PID:1519
            • /bin/ps
              ps -eo "pid,tty"
              3⤵
              • Reads CPU attributes
              • Reads runtime system information
              PID:1518

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Impair Defenses

        1
        T1562

        Virtualization/Sandbox Evasion

        1
        T1497

        Discovery

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads