Analysis
-
max time kernel
132s -
max time network
153s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240611-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
01-11-2024 13:59
Behavioral task
behavioral1
Sample
zmap.x86.elf
Resource
ubuntu2004-amd64-20240611-en
ubuntu-20.04-amd64
4 signatures
150 seconds
General
-
Target
zmap.x86.elf
-
Size
61KB
-
MD5
f7505a8b058281835546dd4549fe7dbc
-
SHA1
5725793206d387662d9dbbc6649bd63dea8929bd
-
SHA256
324f57878b778a67a8a8fb8bbb651411b54042331bf9b22fb692252f1772ed8f
-
SHA512
f07626f3aa0103d417bc3cb4ef60133066d463ade98ba486bd706c54df0a428f27023f5e737abc5214f79026ce39fd91966a65cafb604b0a342b379c2dc7f8db
-
SSDEEP
1536:1BGfyT5OGMMt4cesUTeFIv5TzHhS3cgodIjOepn2C:1caT5OGMMtmaATzBS3Ro2Kanr
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
zmap.x86.elfpid Process 1400 zmap.x86.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
zmap.x86.elfdescription ioc Process File opened for modification /dev/watchdog zmap.x86.elf File opened for modification /dev/misc/watchdog zmap.x86.elf -
Writes file to system bin folder 2 IoCs
Processes:
zmap.x86.elfdescription ioc Process File opened for modification /sbin/watchdog zmap.x86.elf File opened for modification /bin/watchdog zmap.x86.elf -
Changes its process name 1 IoCs
Processes:
zmap.x86.elfdescription pid Process Changes the process name, possibly in an attempt to hide itself 1400 zmap.x86.elf