Analysis
-
max time kernel
147s -
max time network
149s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240729-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
11-11-2024 03:02
Behavioral task
behavioral1
Sample
cc283e2779c46dd41b8a9e4877834aca474e11bb63e058dbd489ea73e8f95184.elf
Resource
ubuntu2004-amd64-20240729-en
ubuntu-20.04-amd64
2 signatures
150 seconds
General
-
Target
cc283e2779c46dd41b8a9e4877834aca474e11bb63e058dbd489ea73e8f95184.elf
-
Size
111KB
-
MD5
79f0bb8774d825bafafd157b51e3e965
-
SHA1
e4f7ccc801fb4f89b7546b6f70c151172fa865eb
-
SHA256
cc283e2779c46dd41b8a9e4877834aca474e11bb63e058dbd489ea73e8f95184
-
SHA512
4378a20c0c3243de92e144a72521676006cc8d03c2a4c8576c2377bb1a8abd6336b9e882a69691a1baa0a2e3dc3ebe103ce3ca476c54d6cb2078d507bef0c0d8
-
SSDEEP
3072:mjzWBo5X5jLu6854Kne0u7kwbgyMgm5qbyCYXmh:g/66CAHMgm5qbyRXmh
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
cc283e2779c46dd41b8a9e4877834aca474e11bb63e058dbd489ea73e8f95184.elfdescription ioc Process File opened for modification /dev/watchdog cc283e2779c46dd41b8a9e4877834aca474e11bb63e058dbd489ea73e8f95184.elf File opened for modification /dev/misc/watchdog cc283e2779c46dd41b8a9e4877834aca474e11bb63e058dbd489ea73e8f95184.elf -
Changes its process name 1 IoCs
Processes:
cc283e2779c46dd41b8a9e4877834aca474e11bb63e058dbd489ea73e8f95184.elfdescription pid Process Changes the process name, possibly in an attempt to hide itself 1401 cc283e2779c46dd41b8a9e4877834aca474e11bb63e058dbd489ea73e8f95184.elf