Overview
overview
7Static
static
1cve_2024_6387/386
ubuntu-24.04-amd64
7cve_2024_6387/aarch64
ubuntu-22.04-amd64
7cve_2024_6387/amd64
ubuntu-22.04-amd64
7cve_2024_6387/arm5
debian-9-armhf
7cve_2024_6387/arm6
debian-9-armhf
7cve_2024_6387/arm7
debian-9-armhf
7cve_2024_6...nup.sh
ubuntu-18.04-amd64
7cve_2024_6...nup.sh
debian-9-armhf
7cve_2024_6...nup.sh
debian-9-mips
7cve_2024_6...nup.sh
debian-9-mipsel
7cve_2024_6387/exploit
ubuntu-22.04-amd64
7cve_2024_6...oit.py
windows7-x64
3cve_2024_6...oit.py
windows10-2004-x64
3cve_2024_6387/mips
debian-9-mips
3cve_2024_6387/mips64
debian-9-mips
cve_2024_6...ps64el
debian-9-mipsel
cve_2024_6387/mipsel
debian-12-mipsel
7Analysis
-
max time kernel
149s -
max time network
151s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240729-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
23-11-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
cve_2024_6387/386
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral2
Sample
cve_2024_6387/aarch64
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral3
Sample
cve_2024_6387/amd64
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral4
Sample
cve_2024_6387/arm5
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
cve_2024_6387/arm6
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral6
Sample
cve_2024_6387/arm7
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral7
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral8
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
cve_2024_6387/exploit
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral12
Sample
cve_2024_6387/exploit.py
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
cve_2024_6387/exploit.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
cve_2024_6387/mips
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral15
Sample
cve_2024_6387/mips64
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral16
Sample
cve_2024_6387/mips64el
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral17
Sample
cve_2024_6387/mipsel
Resource
debian12-mipsel-20240221-en
General
-
Target
cve_2024_6387/amd64
-
Size
5.1MB
-
MD5
2be087e54204a6c395e05516c53fd579
-
SHA1
3bdad143cd168a2015aba2053e53f99a24d52ace
-
SHA256
b60ad90687871ae94e2b33cf2320f523ee614893215335dc5958a6a705488330
-
SHA512
2ab629a5f9637c7026069e5cc7b473968290b8eb42158dc93c46613d2b4b0ef39149f158b71dda8b2c8bbbebd58ba28cf5437fc0d083fca37deb84423a769db8
-
SSDEEP
49152:YB9Em2vjYVfh5jw9aF8k4yHwXrD3LwJKiCb85E6l9HblTLEGdvIRKnuI:QDVf/Y4jMrDr8E+rvuK1
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog amd64 File opened for modification /dev/misc/watchdog amd64 -
Creates/modifies environment variables 1 TTPs 3 IoCs
Creating/modifying environment variables is a common persistence mechanism.
description ioc Process File opened for modification /etc/profile.d/bash.cfg amd64 File opened for modification /etc/profile.d/bash.cfg.sh amd64 File opened for modification /etc/profile.d/gateway.sh amd64 -
description ioc Process File opened for modification /etc/init.d/apport amd64 File opened for modification /etc/init.d/avahi-daemon amd64 File opened for modification /etc/init.d/console-setup.sh amd64 File opened for modification /etc/init.d/cups amd64 File opened for modification /etc/init.d/hwclock.sh amd64 File opened for modification /etc/init.d/openvpn amd64 File opened for modification /etc/init.d/cron amd64 File opened for modification /etc/init.d/kmod amd64 File opened for modification /etc/init.d/plymouth-log amd64 File opened for modification /etc/init.d/spice-vdagent amd64 File opened for modification /etc/init.d/unattended-upgrades amd64 File opened for modification /etc/init.d/iscsid amd64 File opened for modification /etc/init.d/rsync amd64 File opened for modification /etc/init.d/anacron amd64 File opened for modification /etc/init.d/saned amd64 File opened for modification /etc/init.d/udev amd64 File opened for modification /etc/init.d/apparmor amd64 File opened for modification /etc/init.d/procps amd64 File opened for modification /etc/init.d/ssh amd64 File opened for modification /etc/init.d/x11-common amd64 File opened for modification /etc/init.d/acpid amd64 File opened for modification /etc/init.d/cryptdisks-early amd64 File opened for modification /etc/init.d/gdm3 amd64 File opened for modification /etc/init.d/keyboard-setup.sh amd64 File opened for modification /etc/init.d/lvm2-lvmpolld amd64 File opened for modification /etc/init.d/open-iscsi amd64 File opened for modification /etc/init.d/plymouth amd64 File opened for modification /etc/init.d/dns-udp4 amd64 File opened for modification /etc/init.d/alsa-utils amd64 File opened for modification /etc/init.d/bluetooth amd64 File opened for modification /etc/init.d/cryptdisks amd64 File opened for modification /etc/init.d/cups-browsed amd64 File opened for modification /etc/init.d/dbus amd64 File opened for modification /etc/init.d/sssd amd64 -
Modifies Bash startup script 2 TTPs 3 IoCs
description ioc Process File opened for modification /etc/profile.d/gateway.sh amd64 File opened for modification /etc/profile.d/bash.cfg amd64 File opened for modification /etc/profile.d/bash.cfg.sh amd64 -
Enumerates kernel/hardware configuration 1 TTPs 2 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size amd64 File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size amd64 -
description ioc Process File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems mount File opened for reading /proc/filesystems sed File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems systemctl
Processes
-
/tmp/cve_2024_6387/amd64/tmp/cve_2024_6387/amd641⤵
- Enumerates kernel/hardware configuration
PID:1562 -
/tmp/cve_2024_6387/amd64/tmp/cve_2024_6387/amd64 " "2⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Modifies Bash startup script
- Enumerates kernel/hardware configuration
PID:1566 -
/usr/sbin/update-rc.dupdate-rc.d dns-udp4 defaults3⤵PID:1576
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:1577
-
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:1577
-
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:1577
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵
- Reads runtime system information
PID:1577
-
-
-
/usr/bin/mountmount -o bind /tmp/ /proc/15663⤵
- Reads runtime system information
PID:1614
-
-
/usr/sbin/serviceservice cron start3⤵PID:1616
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1617
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1618
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵
- Reads runtime system information
PID:1621
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵
- Reads runtime system information
PID:1620
-
-
-
/usr/local/sbin/systemctlsystemctl start cron.service3⤵PID:1616
-
-
/usr/local/bin/systemctlsystemctl start cron.service3⤵PID:1616
-
-
/usr/sbin/systemctlsystemctl start cron.service3⤵PID:1616
-
-
/usr/bin/systemctlsystemctl start cron.service3⤵
- Reads runtime system information
PID:1616
-
-
/usr/bin/systemctlsystemctl start crond.service3⤵
- Reads runtime system information
PID:1622
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5f449ef47c4f79ab4ecfe3d11022333d5
SHA161ebb524cee5a049cc96bf2cbf339a47dcb1b622
SHA256503dffa20530956c5f61187e00935f20fe508c35dbb1fcf665b5d28d07d3d704
SHA512a7015de8bd582dbf7ce6df708a58a725e1b1cd472c6616fbb89a9738c533c042ac39c071ca0cf2fc5df8e56f33bf8a28b1ebd3076570f5028cff773af89031f6
-
Filesize
5.1MB
MD52be087e54204a6c395e05516c53fd579
SHA13bdad143cd168a2015aba2053e53f99a24d52ace
SHA256b60ad90687871ae94e2b33cf2320f523ee614893215335dc5958a6a705488330
SHA5122ab629a5f9637c7026069e5cc7b473968290b8eb42158dc93c46613d2b4b0ef39149f158b71dda8b2c8bbbebd58ba28cf5437fc0d083fca37deb84423a769db8
-
Filesize
57B
MD525bfc97b9241077f7ee65c9d5831c0ae
SHA14d1e84cfe6f0619642400cbcc77ee008d452f622
SHA2567e18da2137e9453fd98ed61aa79420a173383b2f7a5fe6538b70fbb560f9b3f6
SHA512e3686c1fe664e67fc503275c6c0fa831ee43c1b081d8f826a616314505e3f952f98a8697911d1799e3f8c1957cd3a1bb5f888766877e5081b32942a6f2d8bff3
-
Filesize
114B
MD592071bcc0922bd1061693f6ed0aa38e7
SHA1d3ae46ee9d53db95102a99a4fe0875472e84b47c
SHA2564ecaef901cf8ede372b908b1bff1b814d2eefedc968c50fb33b460ccd02d4829
SHA512423e22a53824cef69dfc701655f2479f7af692a8df1eb3c1120f643d872dfc0f0b4377ab8be81d1eb373cef59258dde20fa6f3c50579c82c1deebf9e79fe1ea5
-
Filesize
159B
MD579f1a0bf1a838c817142e43a5818733a
SHA1768ed04a737dbdc969165092694e0e977321ca19
SHA256a3f7d4499b03a14ff2de76122b6a61c221151f59daa6a63a78ae5a805c95a482
SHA512b6d6f76f3e5b768a6670e05276724b70609259c856ba90ad34f8a782ac40134b9cf5cdabebb4aa55f076a786cedf8491adda9835f9d4aee90bd1820a45b2fbce
-
Filesize
4KB
MD54112c36725ae465f31485ef9fa0d132d
SHA19eafc2693ebbf829390bc5f53639cb253eae9e9e
SHA256f530cd599d2505c40f29bd284ce61bc7227f0579ff88160ab72a00a3ddfe0f21
SHA512dcb6f4a6d592d0f8f766e39dfa5bc5b8eb52a1924c5287ed64a5fefeca344cbb4c48a596e1335b30757d30918c90d439ad453c22b62216953f44349c153a348b