Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    ubuntu-24.04_amd64
  • resource
    ubuntu2404-amd64-20240523-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system
  • submitted
    27/06/2024, 18:31

General

  • Target

    LinuxTF.elf

  • Size

    1.0MB

  • MD5

    26109e7fce4c8039245b081c641a6431

  • SHA1

    244acb320b2cf22dd82489a271160cc4c427b59e

  • SHA256

    82408466094a73994c42bd890a9732a9f731474b8d697d845c864fb81727f272

  • SHA512

    c72d9373c4cf960bff4ff5317c1d7ed080a57c2be67914294a2ce01918e552d1f7c23e8e7b3d834d712ba480046bf1a9ab51f2b028918df008dbbe58baf5ad83

  • SSDEEP

    24576:RsqZhvnhHXuhshNjm3Bp6gDgR16lwzBWa4wwS49TrHg29XE/PnroyUkNR9:PhvnhHXuhshNjK8AlGWao2royUk

Score
8/10

Malware Config

Signatures

  • Writes memory of remote process 3 IoCs
  • Loads a kernel module 28 IoCs

    Loads a Linux kernel module, potentially to achieve persistence

  • Changes its process name 11 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 28 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/LinuxTF.elf
    /tmp/LinuxTF.elf
    1⤵
    • Writes memory of remote process
    • Loads a kernel module
    PID:2483
  • /proc/self/fd/9
    /usr/lib/systemd/systemd-executor --deserialize 45 --log-level info --log-target journal-or-kmsg
    1⤵
    • Changes its process name
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    PID:2517
  • /usr/sbin/agent
    /usr/sbin/agent
    1⤵
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    PID:2517
  • /proc/self/fd/9
    /usr/lib/systemd/systemd-executor --deserialize 60 --log-level info --log-target journal-or-kmsg
    1⤵
    • Changes its process name
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    PID:2553
  • /usr/sbin/anacron
    /usr/sbin/anacron -d -q -s
    1⤵
      PID:2553

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads