Analysis
-
max time kernel
149s -
max time network
148s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
12-08-2024 14:08
General
-
Target
b2b9016a2d5f8dfeeefae54a78f7e7270c275426e00dc3e6c3a630fbe3abb68e.elf
-
Size
184KB
-
MD5
f278f98c99f7c491ec69e14f54ba67e4
-
SHA1
a51e82c7774726cfe25a91a490d92d6cd403fe61
-
SHA256
b2b9016a2d5f8dfeeefae54a78f7e7270c275426e00dc3e6c3a630fbe3abb68e
-
SHA512
551df47531cc5d824d5859eac858cc4682e43680ff1dff65a6597aba216a2c26981747c9c31fbe7f6d04f314599d28ce6540f64828b729b2ab619e9a1aeec040
-
SSDEEP
3072:jP+3T0o63VGtfVKj+dcVjVIE85ek0E9cStruVxZcEukof4Rl0GOy+:rOT0tgttRgy5e9E9tuVxxuxfEl0ty+
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule behavioral1/memory/2315-1-0x000074110edf4000-0x000074110ee08760-memory.dmp family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule behavioral1/memory/2315-1-0x000074110edf4000-0x000074110ee08760-memory.dmp family_kaiten -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe b2b9016a2d5f8dfeeefae54a78f7e7270c275426e00dc3e6c3a630fbe3abb68e.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.ssh b2b9016a2d5f8dfeeefae54a78f7e7270c275426e00dc3e6c3a630fbe3abb68e.elf