Analysis
-
max time kernel
0s -
max time network
4s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240508-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
29/09/2024, 19:05
Behavioral task
behavioral1
Sample
x86
Resource
ubuntu2004-amd64-20240508-en
2 signatures
150 seconds
General
-
Target
x86
-
Size
34KB
-
MD5
2b792a5a5020bb9c578ff66373b61fdb
-
SHA1
62588b2c7a0b2cbd9ca00ca2b06c3600211ef364
-
SHA256
75b9f5fe167b850671d617f97204bda789503784fe133a741b21d5c4c1d129b0
-
SHA512
05acbcb44de3cb0423108e8ebd67930a79e37f3dcd5676ac3a27747ee16fa89764d24da921f50ce924d0005638aff24b9889e10b14e6769070d8e9139e44c49c
-
SSDEEP
768:8NHYex0p3fbY/vxWOlJkndMPBSRxwV5Jmk82T:8NHYex0pPbYn4OlW8B9V5JV82T
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog x86 File opened for modification /dev/misc/watchdog x86 -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/Sofia 1401 x86