Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240729-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
31-10-2024 22:52
Behavioral task
behavioral1
Sample
linux_386.elf
Resource
ubuntu1804-amd64-20240729-en
General
-
Target
linux_386.elf
-
Size
5.0MB
-
MD5
248846ad88fdaccddece36b05811a576
-
SHA1
2dac57a664c60e1dbe1b51bd75b74ab7980bff30
-
SHA256
0c1c800bbbce56afc46ceccc33b8e703d6f43673c92c07a43d2e980d0e427bde
-
SHA512
0923b7b888aa9e15cff490093f2b626ed864e11cd1b31dc6e52b633dc1a054e2eb211b96a033ecbe9455ce93469ffa625037125e20ad400e619188ab766e898e
-
SSDEEP
49152:E33d0lGt6UHcFL7Rn2o03wiEhiDmzzd/9sARlBs/00Cpfx9a9uNNp9hW16klbU6V:E33GlbU8FwmzzRDZ9maqRV
Malware Config
Extracted
kaiji
78789.dns.army:808
Signatures
-
Kaiji 1 IoCs
Kaiji payload
Processes:
resource yara_rule /etc/id.services.conf Kaiji -
Kaiji family
-
kaiji_chaosbot 1 IoCs
Chaos-variant payload
Processes:
resource yara_rule /etc/id.services.conf kaiji_chaosbot -
Executes dropped EXE 7 IoCs
Processes:
32678id.services.conf32678id.services.confid.services.conf32678id.services.confioc pid process /etc/32678 1558 32678 /etc/id.services.conf 1620 id.services.conf /etc/32678 1627 32678 /etc/id.services.conf 1628 id.services.conf /etc/id.services.conf 1656 id.services.conf /etc/32678 1663 32678 /etc/id.services.conf 1664 id.services.conf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
linux_386.elfdescription ioc process File opened for modification /dev/watchdog linux_386.elf File opened for modification /dev/misc/watchdog linux_386.elf -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Creates/modifies environment variables 1 TTPs 3 IoCs
Creating/modifying environment variables is a common persistence mechanism.
Processes:
linux_386.elfdescription ioc process File opened for modification /etc/profile.d/bash_config linux_386.elf File opened for modification /etc/profile.d/linux.sh linux_386.elf File opened for modification /etc/profile.d/bash_config.sh linux_386.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Processes:
linux_386.elfdescription ioc process File opened for modification /etc/init.d/ssh linux_386.elf File opened for modification /etc/init.d/linux_kill linux_386.elf -
Write file to user bin folder 2 IoCs
Processes:
linux_386.elfdescription ioc process File opened for modification /usr/bin/find linux_386.elf File opened for modification /usr/bin/lsof linux_386.elf -
Modifies Bash startup script 2 TTPs 3 IoCs
Processes:
linux_386.elfdescription ioc process File opened for modification /etc/profile.d/bash_config.sh linux_386.elf File opened for modification /etc/profile.d/bash_config linux_386.elf File opened for modification /etc/profile.d/linux.sh linux_386.elf -
Changes its process name 1 IoCs
Processes:
linux_386.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself ksoftirqd/0 1572 linux_386.elf -
Reads CPU attributes 1 TTPs 2 IoCs
Processes:
pkillpkilldescription ioc process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill -
Enumerates kernel/hardware configuration 1 TTPs 6 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
linux_386.elflinux_386.elfid.services.confid.services.confid.services.confid.services.confdescription ioc process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size linux_386.elf File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size linux_386.elf File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size id.services.conf File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size id.services.conf File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size id.services.conf File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size id.services.conf -
Processes:
pkillpkillsystemctlsystemctlsystemctllinux_386.elfsystemctlsystemctlsystemctlsystemctlsystemctldescription ioc process File opened for reading /proc/705/cmdline pkill File opened for reading /proc/1383/status pkill File opened for reading /proc/9/cmdline pkill File opened for reading /proc/1043/status pkill File opened for reading /proc/sys/kernel/osrelease systemctl File opened for reading /proc/523/cmdline pkill File opened for reading /proc/1/environ systemctl File opened for reading /proc/1261/status pkill File opened for reading /proc/89/status pkill File opened for reading /proc/1143/cmdline pkill File opened for reading /proc/sys/kernel/osrelease systemctl File opened for reading /proc/8/status pkill File opened for reading /proc/1170/status pkill File opened for reading /proc/1197/stat linux_386.elf File opened for reading /proc/1/environ systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/26/cmdline pkill File opened for reading /proc/1316/status pkill File opened for reading /proc/1190/stat linux_386.elf File opened for reading /proc/173/cmdline pkill File opened for reading /proc/89/cmdline pkill File opened for reading /proc/1130/cmdline pkill File opened for reading /proc/35/status pkill File opened for reading /proc/576/cmdline pkill File opened for reading /proc/311/status pkill File opened for reading /proc/1190/cmdline pkill File opened for reading /proc/26/cmdline pkill File opened for reading /proc/31/status pkill File opened for reading /proc/12/status pkill File opened for reading /proc/4/status pkill File opened for reading /proc/176/cmdline pkill File opened for reading /proc/1/sched systemctl File opened for reading /proc/477/cmdline pkill File opened for reading /proc/84/status pkill File opened for reading /proc/1115/status pkill File opened for reading /proc/sys/kernel/osrelease systemctl File opened for reading /proc/464/status pkill File opened for reading /proc/648/status pkill File opened for reading /proc/1549/status pkill File opened for reading /proc/filesystems systemctl File opened for reading /proc/166/cmdline pkill File opened for reading /proc/613/status pkill File opened for reading /proc/1130/stat linux_386.elf File opened for reading /proc/23/status pkill File opened for reading /proc/311/cmdline pkill File opened for reading /proc/1134/status pkill File opened for reading /proc/31/cmdline pkill File opened for reading /proc/647/status pkill File opened for reading /proc/650/status pkill File opened for reading /proc/1197/cmdline pkill File opened for reading /proc/1138/stat linux_386.elf File opened for reading /proc/5/status pkill File opened for reading /proc/11/status pkill File opened for reading /proc/18/status pkill File opened for reading /proc/1261/cmdline pkill File opened for reading /proc/sys/kernel/osrelease systemctl File opened for reading /proc/13/cmdline pkill File opened for reading /proc/248/cmdline pkill File opened for reading /proc/1138/cmdline pkill File opened for reading /proc/6/status pkill File opened for reading /proc/80/status pkill File opened for reading /proc/1244/cmdline pkill File opened for reading /proc/1314/cmdline pkill File opened for reading /proc/1170/stat linux_386.elf -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 15 Go-http-client/1.1
Processes
-
/tmp/linux_386.elf/tmp/linux_386.elf1⤵
- Enumerates kernel/hardware configuration
PID:1552 -
/bin/shsh -c "/etc/32678&"2⤵PID:1556
-
/usr/sbin/serviceservice crond start2⤵PID:1557
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:1560
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:1569
-
/bin/systemctlsystemctl --quiet is-active multi-user.target3⤵PID:1573
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"3⤵PID:1580
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"3⤵
- Reads runtime system information
PID:1576 -
/tmp/linux_386.elf/tmp/linux_386.elf " "2⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Write file to user bin folder
- Modifies Bash startup script
- Changes its process name
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1559 -
/usr/sbin/update-rc.dupdate-rc.d linux_kill defaults3⤵PID:1574
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:1587
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:1587
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:1587
-
/usr/bin/systemctlsystemctl daemon-reload4⤵PID:1587
-
/sbin/systemctlsystemctl daemon-reload4⤵PID:1587
-
/bin/systemctlsystemctl daemon-reload4⤵
- Reads runtime system information
PID:1587 -
/bin/bashbash -c "echo \"*/1 * * * * root /.img \" >> /etc/crontab"3⤵
- Creates/modifies Cron job
PID:1591 -
/usr/bin/renicerenice -20 15593⤵PID:1592
-
/bin/mountmount -o bind /tmp/ /proc/15593⤵PID:1593
-
/usr/sbin/serviceservice cron start3⤵PID:1595
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1596
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1597
-
/bin/systemctlsystemctl --quiet is-active multi-user.target4⤵PID:1598
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵PID:1601
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵PID:1600
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:1595
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:1595
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:1595
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:1595
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:1595
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵
- Reads runtime system information
PID:1595 -
/bin/systemctlsystemctl start crond.service3⤵
- Reads runtime system information
PID:1608
-
/etc/32678/etc/326781⤵
- Executes dropped EXE
PID:1558 -
/bin/sleepsleep 602⤵PID:1564
-
/etc/id.services.conf/etc/id.services.conf2⤵
- Executes dropped EXE
- Enumerates kernel/hardware configuration
PID:1620 -
/usr/bin/pkillpkill -9 326783⤵
- Reads CPU attributes
- Reads runtime system information
PID:1624 -
/bin/shsh -c "/etc/32678&"3⤵PID:1625
-
/usr/sbin/serviceservice crond start3⤵PID:1626
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1629
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1631
-
/bin/systemctlsystemctl --quiet is-active multi-user.target4⤵
- Reads runtime system information
PID:1634 -
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵PID:1638
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵PID:1637
-
/etc/id.services.conf/etc/id.services.conf " "3⤵
- Executes dropped EXE
- Enumerates kernel/hardware configuration
PID:1628
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1557
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1557
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1557
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1557
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1557
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵
- Reads runtime system information
PID:1557
-
/etc/32678/etc/326781⤵
- Executes dropped EXE
PID:1627 -
/bin/sleepsleep 602⤵PID:1630
-
/etc/id.services.conf/etc/id.services.conf2⤵
- Executes dropped EXE
- Enumerates kernel/hardware configuration
PID:1656 -
/usr/bin/pkillpkill -9 326783⤵
- Reads CPU attributes
- Reads runtime system information
PID:1660 -
/bin/shsh -c "/etc/32678&"3⤵PID:1661
-
/usr/sbin/serviceservice crond start3⤵PID:1662
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1665
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1667
-
/bin/systemctlsystemctl --quiet is-active multi-user.target4⤵PID:1670
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵PID:1674
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵PID:1673
-
/etc/id.services.conf/etc/id.services.conf " "3⤵
- Executes dropped EXE
- Enumerates kernel/hardware configuration
PID:1664
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1626
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1626
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1626
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1626
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1626
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵
- Reads runtime system information
PID:1626
-
/etc/32678/etc/326781⤵
- Executes dropped EXE
PID:1663 -
/bin/sleepsleep 602⤵PID:1666
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1662
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1662
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1662
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1662
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:1662
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵
- Reads runtime system information
PID:1662
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5d73d3376908ea075a939e3871ad0fabe
SHA1320ff65831247ba199515f1b94df26cc8a3e5f76
SHA256edbdabe30d8236a2c0a4eb89dfd597552130e4c1a4e93f8fe1568920442ad73a
SHA51257b83fef88620598beb5d65626bf757d0abef242d2d6a01796a61474dedc5095a4a9d0f292b6abb450cad3d4410ab8456253600f58ddb66cfe6d79e1c8415536
-
Filesize
61B
MD5768eaf287796da19e1cf5e0b2fb1b161
SHA16a1ce2ee5ccc86d1f33806feb14547b35290df2a
SHA2561d22620dfb2a6715e5d745aed5cf841ede0e75e1747f12b9b925a2d346bc7ecb
SHA512e6af30c9df4f7f47696069511e64ecbc8e841629d692ee4056503df3533fb7a7a74960698826260355e1dba7b6c562482a27a39bb51a4237473ce4b68472d620
-
Filesize
5.0MB
MD5248846ad88fdaccddece36b05811a576
SHA12dac57a664c60e1dbe1b51bd75b74ab7980bff30
SHA2560c1c800bbbce56afc46ceccc33b8e703d6f43673c92c07a43d2e980d0e427bde
SHA5120923b7b888aa9e15cff490093f2b626ed864e11cd1b31dc6e52b633dc1a054e2eb211b96a033ecbe9455ce93469ffa625037125e20ad400e619188ab766e898e
-
Filesize
189B
MD53909975f7cc0d1121c1819b800069f31
SHA13e68de708c2e6c40fab6794afdee3104e5590189
SHA2566876dac71f13a068afb863d257134275f2edba43b2acaf4924fabf97c079070b
SHA51250600cceeb03b05f45ae61d890caee9f51ff390b6776930866e527e071d65d08241fc66673fd9b99d62fbc77d3c00fc3de4d7378cbc42f5daba5d83072b0906e
-
Filesize
37B
MD5cfb4e51061485fe91169381fbdc1538e
SHA19a85b9b766a15b01737a41d680e4593b7a9bde87
SHA256897f37267d0ceaa2fbdaa09847f5d08e6f8b01a0348a0d666264b0f10acd0c90
SHA512fb154ec711d2090a7461da4db8ddad2b522649a27e74162ecb203f539b1729430288bc02d78d2071bde9c4bbc005693403a57612ef50277d52f816cb94524216