Analysis
-
max time kernel
136s -
max time network
139s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240729-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
28/09/2024, 08:35
Behavioral task
behavioral1
Sample
cayo.x86.elf
Resource
ubuntu2404-amd64-20240729-en
4 signatures
150 seconds
General
-
Target
cayo.x86.elf
-
Size
124KB
-
MD5
710d5ba4c576ad41434f42ee741c322e
-
SHA1
c5bf431686fb19e412b22feaf75b3eccbcd0b592
-
SHA256
f7769f22d32d13539bbaab9365ec026921b0a83e200fb124688df815b1825a44
-
SHA512
37dc200f27870287b4051877a39517853ef93d704f5c8dafc4c01b39cdc6aa5b04ce5036dd6bb5e766989023cd64e3881bf63f0d61b86f9cfc947855897e27a9
-
SSDEEP
3072:5GGcWjSsoL+X23FMMZDD2g06OuPmr1zwOaWN9:jjm6+3DPmr1zwOaWN9
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog cayo.x86.elf File opened for modification /dev/misc/watchdog cayo.x86.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route cayo.x86.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /usr/sbin/dropbear 2547 cayo.x86.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route cayo.x86.elf