Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
14-11-2024 03:03
Behavioral task
behavioral1
Sample
c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elf
-
Size
36KB
-
MD5
f2f60d4a6a730922e0ba0f726bda9b1c
-
SHA1
52d1c36c09ddbc562804583c7cc56d1d75c564b2
-
SHA256
c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916
-
SHA512
b49b54b917b6eb9a144b3b182e2f213bbf20b5aef44a60119a85496f7aa19dce8ad20d4f63b6c1fc61ff27e35b2ec329906650c327e53f7d8c733a991ede643e
-
SSDEEP
768:3dXCmneD1ZkdpWWYwk8rvNBS+05BigNqr2KY/bSv9sPCi:NS22K9YervN0+0aOmDfFuCi
Malware Config
Extracted
mirai
MIRAI
Signatures
-
Mirai family
-
Contacts a large (23992) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shchmodpid process 2768 sh 2772 chmod -
Changes its process name 1 IoCs
Processes:
c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/busybox 2766 c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elf -
Processes:
c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elfmkdirmvdescription ioc process File opened for reading /proc/self/exe c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elf/tmp/c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elf1⤵
- Changes its process name
- Reads runtime system information
PID:2766 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:2768 -
/usr/bin/rmrm -rf bin/busybox3⤵PID:2769
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:2770
-
-
/usr/bin/mvmv /tmp/c04b0a7147f1f0d71c6cb9dc127fa3b1e3ff3389d5b9ce06d399389f87637916.elf bin/busybox3⤵
- Reads runtime system information
PID:2771
-
-
/usr/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:2772
-
-