Analysis
-
max time kernel
138s -
max time network
141s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
11-11-2024 09:41
Behavioral task
behavioral1
Sample
01bb27f3d20872a97647195960ae201aac0fecf0e1951cb52414037fde92b042.elf
Resource
ubuntu2204-amd64-20240611-en
ubuntu-22.04-amd64
2 signatures
150 seconds
General
-
Target
01bb27f3d20872a97647195960ae201aac0fecf0e1951cb52414037fde92b042.elf
-
Size
107KB
-
MD5
00fef8bfc64ff47c4919d5dc8d574029
-
SHA1
ca9e877028c2cd2ca511ca92b2a4fceb3139291a
-
SHA256
01bb27f3d20872a97647195960ae201aac0fecf0e1951cb52414037fde92b042
-
SHA512
a6ea089f704ce209a58c90f3f64ab9d07a2400dbb4c25c61a2216f42db2c27665e169d2d57f7f971488b680507d65d49c391990236581b67b4cbe096c2ea270d
-
SSDEEP
3072:ZFHv0mqU75U5Cl+eextNko4G3AjgsxF0m5qbyCYXmh:ZZ0B25CCRexkfG3AjgoGm5qbyRXmh
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
01bb27f3d20872a97647195960ae201aac0fecf0e1951cb52414037fde92b042.elfdescription ioc Process File opened for modification /dev/watchdog 01bb27f3d20872a97647195960ae201aac0fecf0e1951cb52414037fde92b042.elf File opened for modification /dev/misc/watchdog 01bb27f3d20872a97647195960ae201aac0fecf0e1951cb52414037fde92b042.elf -
Changes its process name 1 IoCs
Processes:
01bb27f3d20872a97647195960ae201aac0fecf0e1951cb52414037fde92b042.elfdescription pid Process Changes the process name, possibly in an attempt to hide itself 1587 01bb27f3d20872a97647195960ae201aac0fecf0e1951cb52414037fde92b042.elf