General
-
Target
934af9b9bf9838d64d44911f92190a6742d152a421ed1a74762fb41b93f7366d.elf
-
Size
69KB
-
Sample
241120-dkcd6stqdj
-
MD5
c060aa8e1d7eeef5b50c97c829f479ff
-
SHA1
3f5bd2cac04b460b9c2d0c07c7d6d95475daaf17
-
SHA256
934af9b9bf9838d64d44911f92190a6742d152a421ed1a74762fb41b93f7366d
-
SHA512
f41aaf9a8dca6c5e3e0163bcffd9ad9f46f5e3d390a55ac602dc36fd374eda903263ac7ca539289a23027a0bed91e91ac5f8746e75ac7f0294c920af07f0171d
-
SSDEEP
1536:FqqTBlmF1tmpq7yP7/rDaTP5Tg435EVzD0zuKNTO7r1hlvw86AQ:FVLmFzCiyP7/PaTxvpEVzDzKNTOdhlva
Static task
static1
Behavioral task
behavioral1
Sample
934af9b9bf9838d64d44911f92190a6742d152a421ed1a74762fb41b93f7366d.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Targets
-
-
Target
934af9b9bf9838d64d44911f92190a6742d152a421ed1a74762fb41b93f7366d.elf
-
Size
69KB
-
MD5
c060aa8e1d7eeef5b50c97c829f479ff
-
SHA1
3f5bd2cac04b460b9c2d0c07c7d6d95475daaf17
-
SHA256
934af9b9bf9838d64d44911f92190a6742d152a421ed1a74762fb41b93f7366d
-
SHA512
f41aaf9a8dca6c5e3e0163bcffd9ad9f46f5e3d390a55ac602dc36fd374eda903263ac7ca539289a23027a0bed91e91ac5f8746e75ac7f0294c920af07f0171d
-
SSDEEP
1536:FqqTBlmF1tmpq7yP7/rDaTP5Tg435EVzD0zuKNTO7r1hlvw86AQ:FVLmFzCiyP7/PaTxvpEVzDzKNTOdhlva
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
2XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Impair Defenses
1