Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240508-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    22-05-2024 01:22

General

  • Target

    3b7e69fb314ffdeb13c36e9ecf20a9476f34374c30ce437dea4e0db193ceb1d8.elf

  • Size

    60KB

  • MD5

    1fa6befa83300967bbd31b7aa745f972

  • SHA1

    8a09dc37d02796146b40e336c7a9c9c5ebba4e8b

  • SHA256

    3b7e69fb314ffdeb13c36e9ecf20a9476f34374c30ce437dea4e0db193ceb1d8

  • SHA512

    a90fb7b23ae9087db504b1778b1bbbca16b147e5cf68646045f710032a8cf5fb92561525fd8df41b0584de83313bc099711f3f4081d781be713031ef8b6dfb41

  • SSDEEP

    1536:W/4vP/fDv1Y7GuNNq4vMSvglokUx3108OFfGPw/62cHBwr:Aa71Y7GuK4vn3+E9HO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Changes its process name 2 IoCs
  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads CPU attributes 1 TTPs 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/3b7e69fb314ffdeb13c36e9ecf20a9476f34374c30ce437dea4e0db193ceb1d8.elf
    /tmp/3b7e69fb314ffdeb13c36e9ecf20a9476f34374c30ce437dea4e0db193ceb1d8.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Changes its process name
    • Checks CPU configuration
    PID:1474
    • /bin/sh
      sh -c "ps -eo pid,tty | grep -E 'pts|tty' | awk '{print \$1}'"
      2⤵
        PID:1480
        • /bin/ps
          ps -eo "pid,tty"
          3⤵
          • Reads CPU attributes
          • Reads runtime system information
          PID:1481
        • /bin/grep
          grep -E "pts|tty"
          3⤵
            PID:1482
          • /usr/bin/awk
            awk "{print \$1}"
            3⤵
              PID:1483

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Impair Defenses

        1
        T1562

        Virtualization/Sandbox Evasion

        1
        T1497

        Discovery

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads