Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    ubuntu-24.04_amd64
  • resource
    ubuntu2404-amd64-20240523-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system
  • submitted
    12-08-2024 14:08

General

  • Target

    b2b9016a2d5f8dfeeefae54a78f7e7270c275426e00dc3e6c3a630fbe3abb68e.elf

  • Size

    184KB

  • MD5

    f278f98c99f7c491ec69e14f54ba67e4

  • SHA1

    a51e82c7774726cfe25a91a490d92d6cd403fe61

  • SHA256

    b2b9016a2d5f8dfeeefae54a78f7e7270c275426e00dc3e6c3a630fbe3abb68e

  • SHA512

    551df47531cc5d824d5859eac858cc4682e43680ff1dff65a6597aba216a2c26981747c9c31fbe7f6d04f314599d28ce6540f64828b729b2ab619e9a1aeec040

  • SSDEEP

    3072:jP+3T0o63VGtfVKj+dcVjVIE85ek0E9cStruVxZcEukof4Rl0GOy+:rOT0tgttRgy5e9E9tuVxxuxfEl0ty+

Score
10/10

Malware Config

Signatures

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Detects Kaiten/Tsunami payload 1 IoCs
  • Kaiten/Tsunami

    Linux-based IoT botnet which is controlled through IRC and normally used to carry out DDoS attacks.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/b2b9016a2d5f8dfeeefae54a78f7e7270c275426e00dc3e6c3a630fbe3abb68e.elf
    /tmp/b2b9016a2d5f8dfeeefae54a78f7e7270c275426e00dc3e6c3a630fbe3abb68e.elf
    1⤵
    • Reads runtime system information
    • Writes file to tmp directory
    PID:2315

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads