General
-
Target
0671ab8eb145cea8e6b613b958a817e12d512a24ea1b5a3a2091a3b556c2a900.elf
-
Size
78KB
-
Sample
240928-bdsfpsydnr
-
MD5
a43c7b0fb823947daaebc84fc7f18d51
-
SHA1
c95a119ea56a0c2b107c7ef47e852ee74e8ac891
-
SHA256
0671ab8eb145cea8e6b613b958a817e12d512a24ea1b5a3a2091a3b556c2a900
-
SHA512
98f518415d6d8ba4670ca4ecdca9ab8d602a881de9a5f450121f6c6dbad87ee8321d4e13538cb8ec8440cdad8acee906ce5e157f2be1478ec340a98c04337099
-
SSDEEP
1536:TETBpHwYwiiTKEZ3D1VLc43UMIIVD2rky1m2S1UX67R7lVC9M:EvHJtiTTZT15c4uWD2j1m2Smq7R7lVIM
Static task
static1
Behavioral task
behavioral1
Sample
0671ab8eb145cea8e6b613b958a817e12d512a24ea1b5a3a2091a3b556c2a900.elf
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Targets
-
-
Target
0671ab8eb145cea8e6b613b958a817e12d512a24ea1b5a3a2091a3b556c2a900.elf
-
Size
78KB
-
MD5
a43c7b0fb823947daaebc84fc7f18d51
-
SHA1
c95a119ea56a0c2b107c7ef47e852ee74e8ac891
-
SHA256
0671ab8eb145cea8e6b613b958a817e12d512a24ea1b5a3a2091a3b556c2a900
-
SHA512
98f518415d6d8ba4670ca4ecdca9ab8d602a881de9a5f450121f6c6dbad87ee8321d4e13538cb8ec8440cdad8acee906ce5e157f2be1478ec340a98c04337099
-
SSDEEP
1536:TETBpHwYwiiTKEZ3D1VLc43UMIIVD2rky1m2S1UX67R7lVC9M:EvHJtiTTZT15c4uWD2j1m2Smq7R7lVIM
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1