Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
11-11-2024 03:13
Behavioral task
behavioral1
Sample
f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elf
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elf
-
Size
36KB
-
MD5
7b6ab415c71284b4c35e8690d71af208
-
SHA1
0d7d3be2139760cfe48dfa5a3c29126175249b73
-
SHA256
f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad
-
SHA512
f0132df1e3d177fa13a5b6d54daff5ab48c63d03aedb8820160f526acb089a77ff030d348ed2321a845fa90fa1847ae83744b65a57beaaff88cc812105854cf0
-
SSDEEP
768:FdXCmnRFXIrd5wVr/FyuCh3JNYiwKuHONTSv9sPC1:rS2RFAErYuYvD8HLFuC1
Malware Config
Extracted
mirai
MIRAI
Signatures
-
Mirai family
-
Contacts a large (23966) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodshpid process 1605 chmod 1601 sh -
Changes its process name 1 IoCs
Processes:
f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/watchdog 1600 f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elf -
Processes:
f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elfmkdirmvdescription ioc process File opened for reading /proc/self/exe f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/bin/watchdog sh
Processes
-
/tmp/f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elf/tmp/f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elf1⤵
- Changes its process name
- Reads runtime system information
PID:1600 -
/bin/shsh -c "rm -rf bin/watchdog && mkdir bin; >bin/watchdog && mv /tmp/f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elf bin/watchdog; chmod 777 bin/watchdog"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:1601 -
/usr/bin/rmrm -rf bin/watchdog3⤵PID:1602
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:1603
-
-
/usr/bin/mvmv /tmp/f71f4e6d67db61fd21bc0c2f612412c8373ee60101fcfc34f0f99bd861d934ad.elf bin/watchdog3⤵
- Reads runtime system information
PID:1604
-
-
/usr/bin/chmodchmod 777 bin/watchdog3⤵
- File and Directory Permissions Modification
PID:1605
-
-