Analysis
-
max time kernel
118s -
max time network
131s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
24-11-2024 08:12
Behavioral task
behavioral1
Sample
x86.elf
Resource
ubuntu2204-amd64-20240611-en
ubuntu-22.04-amd64
5 signatures
150 seconds
General
-
Target
x86.elf
-
Size
213KB
-
MD5
d3194a1edfdb612594a2e16fec921089
-
SHA1
2f56ec6ba4f3ee5f796f3c336c0bcadd19d6f970
-
SHA256
73b2b6ec94ae260cfeca07d26370ab028f731c534265bb73414382598bd1975b
-
SHA512
0a367c7f6d1c414830177f62098cc688d12d2f8d78f54916b8a1589e32cbec42792be1bf6c6fa5a41d6bc1234017c03f2e8908ac39d76e72749726d756b63614
-
SSDEEP
6144:kdRvYEKvfTnY4s2sTSHSLmDoXSC9+TqVCi00:kuTi2vVDoXSC9+TqVC30
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
x86.elfdescription ioc process File opened for modification /dev/misc/watchdog x86.elf File opened for modification /dev/watchdog x86.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
x86.elfdescription ioc process File opened for reading /proc/net/route x86.elf -
Writes file to system bin folder 2 IoCs
Processes:
x86.elfdescription ioc process File opened for modification /sbin/watchdog x86.elf File opened for modification /bin/watchdog x86.elf -
Changes its process name 1 IoCs
Processes:
x86.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /usr/sbin/dropbear 1594 x86.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
x86.elfdescription ioc process File opened for reading /proc/net/route x86.elf