Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240522.1-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240522.1-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    20-11-2024 12:10

General

  • Target

    39964833437fed0f7d35c2972c72700f5893efa77ffcfa77306c96b7f4954ff8.elf

  • Size

    45KB

  • MD5

    1ca380662c9ca375f453b797dca7c230

  • SHA1

    724b9fc6060d239c8be3a67734222a158099e1ef

  • SHA256

    39964833437fed0f7d35c2972c72700f5893efa77ffcfa77306c96b7f4954ff8

  • SHA512

    73ca7923b6657d98134954c9db8d3e73b1cb9c41a54583914a1733e41fb495d46dde7b131fb6aa51324429793fffe68b2024523da283c841ff7749eebd2f3c43

  • SSDEEP

    768:maMd0PgGLhqtP3GOTVTbO/CX53fudNfGHiaWB8bcBq62xhHwsAM:mac/GUPpqNfkSYcBqnxhHn/

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads process memory 1 TTPs 50 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 1 IoCs
  • Reads runtime system information 63 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/39964833437fed0f7d35c2972c72700f5893efa77ffcfa77306c96b7f4954ff8.elf
    /tmp/39964833437fed0f7d35c2972c72700f5893efa77ffcfa77306c96b7f4954ff8.elf
    1⤵
    • Modifies Watchdog functionality
    • Reads process memory
    • Changes its process name
    • Reads runtime system information
    PID:1549

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads