General
-
Target
5b56bb90601a55fb49bea46f524a47570b4a0a9117bd7d545f406a78d2f3f2c5
-
Size
90KB
-
Sample
241122-pa2rvszpf1
-
MD5
563205e6c072588081ca841fc18d9f71
-
SHA1
1f7509a4c3456b8d29d504852648efface0e60cf
-
SHA256
5b56bb90601a55fb49bea46f524a47570b4a0a9117bd7d545f406a78d2f3f2c5
-
SHA512
e55bbe2f62f898a1ee483fbed038de6d987c1cbac6688b3d12bf0a4f36a3d503abf474df82495d6b3e0c4ce60b01869bc497855879b6012c2cda9afba93b55f8
-
SSDEEP
1536:0loZZa3wD/CqhX9tLPGcMXNPsVzqbvGxHyAG/jZaZSibj7l3i2XE51SRhtQR/ad:0lEkwD/Cq9XOW+bvGy9csEjh3zUyh2ad
Static task
static1
Behavioral task
behavioral1
Sample
5b56bb90601a55fb49bea46f524a47570b4a0a9117bd7d545f406a78d2f3f2c5
Resource
ubuntu2004-amd64-20240611-en
Malware Config
Targets
-
-
Target
5b56bb90601a55fb49bea46f524a47570b4a0a9117bd7d545f406a78d2f3f2c5
-
Size
90KB
-
MD5
563205e6c072588081ca841fc18d9f71
-
SHA1
1f7509a4c3456b8d29d504852648efface0e60cf
-
SHA256
5b56bb90601a55fb49bea46f524a47570b4a0a9117bd7d545f406a78d2f3f2c5
-
SHA512
e55bbe2f62f898a1ee483fbed038de6d987c1cbac6688b3d12bf0a4f36a3d503abf474df82495d6b3e0c4ce60b01869bc497855879b6012c2cda9afba93b55f8
-
SSDEEP
1536:0loZZa3wD/CqhX9tLPGcMXNPsVzqbvGxHyAG/jZaZSibj7l3i2XE51SRhtQR/ad:0lEkwD/Cq9XOW+bvGy9csEjh3zUyh2ad
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads EFI boot settings
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1